Vulnerability Name:

CVE-2015-3826 (CCN-105690)

Assigned:2015-07-27
Published:2015-07-27
Updated:2017-09-21
Summary:The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote attackers to cause a denial of service (integer underflow, buffer over-read, and mediaserver process crash) via crafted 3GPP metadata, aka internal bug 20923261, a related issue to CVE-2015-3828.
CVSS v3 Severity:9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-189
CWE-119
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Zimperium Mobile Security Blog, Monday, Jul 27 2015 at 13:02
Experts Found a Unicorn in the Heart of AndroidExperts Found a Unicorn in the Heart of Android

Source: MITRE
Type: CNA
CVE-2015-3826

Source: CCN
Type: CNNMoney (New York) July 28, 2015: 10:32 AM ET
Android phones can be hacked with a simple text

Source: CONFIRM
Type: UNKNOWN
http://www.huawei.com/en/psirt/security-advisories/hw-448928

Source: CCN
Type: US-CERT VU#924951
Android Stagefright contains multiple vulnerabilities

Source: BID
Type: UNKNOWN
76052

Source: CCN
Type: BID-76052
Google Stagefright Media Playback Engine Multiple Remote Code Execution Vulnerabilities

Source: SECTRACK
Type: UNKNOWN
1033094

Source: CCN
Type: WIRED Security
Hack Brief: The Android Text Attack

Source: CONFIRM
Type: UNKNOWN
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm

Source: CCN
Type: Google Android GIT repositories
android Git repositories

Source: CONFIRM
Type: Vendor Advisory
https://android.googlesource.com/platform/frameworks/av/+/f4f7e0c102819f039ebb1972b3dba1d3186bc1d1

Source: XF
Type: UNKNOWN
google-android-cve20153826-bo(105690)

Source: MLIST
Type: Vendor Advisory
[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-3826

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:android:*:*:*:*:*:*:*:* (Version <= 5.1)

  • Configuration CCN 1:
  • cpe:/o:google:android:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20153826000
    V
    CVE-2015-3826 on Ubuntu 14.04 LTS (trusty) - negligible.
    2015-09-30
    BACK
    google android *
    google android 2.2
    google android 2.3
    google android 3.0
    google android 3.1
    google android 3.2
    google android 4.0
    google android 4.2
    google android 4.3
    google android 4.4
    google android 5.0