Lucene search

K
cve[email protected]CVE-2015-3827
HistoryOct 01, 2015 - 12:59 a.m.

CVE-2015-3827

2015-10-0100:59:00
CWE-119
CWE-189
web.nvd.nist.gov
22
mpeg4extractor
parsechunk
libstagefright
android
cve-2015-3827
nvd
vulnerability
code execution
denial of service

7.8 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.578 Medium

EPSS

Percentile

97.7%

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

CPENameOperatorVersion
google:androidgoogle androidle5.1

7.8 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.578 Medium

EPSS

Percentile

97.7%