Vulnerability Name:

CVE-2015-3824 (CCN-105692)

Assigned:2015-07-27
Published:2015-07-27
Updated:2017-09-21
Summary:The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly restrict size addition, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via a crafted MPEG-4 tx3g atom, aka internal bug 20923261.
CVSS v3 Severity:9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Zimperium Mobile Security Blog, Monday, Jul 27 2015 at 13:02
Experts Found a Unicorn in the Heart of AndroidExperts Found a Unicorn in the Heart of Android

Source: MITRE
Type: CNA
CVE-2015-3824

Source: CCN
Type: CNNMoney (New York) July 28, 2015: 10:32 AM ET
Android phones can be hacked with a simple text

Source: CONFIRM
Type: UNKNOWN
http://www.huawei.com/en/psirt/security-advisories/hw-448928

Source: CCN
Type: US-CERT VU#924951
Android Stagefright contains multiple vulnerabilities

Source: BID
Type: UNKNOWN
76052

Source: CCN
Type: BID-76052
Google Stagefright Media Playback Engine Multiple Remote Code Execution Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1033094

Source: CCN
Type: WIRED Security
Hack Brief: The Android Text Attack

Source: CONFIRM
Type: UNKNOWN
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm

Source: CCN
Type: Google Android GIT repositories
android Git repositories

Source: CONFIRM
Type: Vendor Advisory
https://android.googlesource.com/platform/frameworks/av/+/463a6f807e187828442949d1924e143cf07778c6

Source: XF
Type: UNKNOWN
google-android-cve20153824-overflow(105692)

Source: MLIST
Type: Vendor Advisory
[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-3824

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:android:*:*:*:*:*:*:*:* (Version <= 5.1)

  • Configuration CCN 1:
  • cpe:/o:google:android:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20153824000
    V
    CVE-2015-3824 on Ubuntu 14.04 LTS (trusty) - negligible.
    2015-09-30
    BACK
    google android *
    google android 2.2
    google android 2.3
    google android 3.0
    google android 3.1
    google android 3.2
    google android 4.0
    google android 4.2
    google android 4.3
    google android 4.4
    google android 5.0