Lucene search

K
cve[email protected]CVE-2015-3827
HistoryOct 01, 2015 - 12:59 a.m.

CVE-2015-3827

2015-10-0100:59:11
CWE-119
CWE-189
web.nvd.nist.gov
24
mpeg4extractor
parsechunk
libstagefright
android
cve-2015-3827
nvd
vulnerability
code execution
denial of service

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.386 Low

EPSS

Percentile

97.3%

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

Affected configurations

NVD
Node
googleandroidRangeโ‰ค5.1
CPENameOperatorVersion
google:androidgoogle androidle5.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.386 Low

EPSS

Percentile

97.3%