mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
28 lines
1.3 KiB
Markdown
28 lines
1.3 KiB
Markdown
### [CVE-2015-3864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3864)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.exploit-db.com/exploits/38226/
|
|
- https://www.exploit-db.com/exploits/39640/
|
|
- https://www.exploit-db.com/exploits/40436/
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864
|
|
- https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
|
|
- https://github.com/HenryVHuang/CVE-2015-3864
|
|
- https://github.com/HighW4y2H3ll/libstagefrightExploit
|
|
- https://github.com/eudemonics/scaredycat
|
|
- https://github.com/hac425xxx/heap-exploitation-in-real-world
|
|
- https://github.com/hoangcuongflp/MobileSecurity2016-recap
|
|
- https://github.com/pwnaccelerator/stagefright-cve-2015-3864
|
|
|