Vulnerability Name:

CVE-2015-3861 (CCN-109223)

Assigned:2015-05-12
Published:2015-05-12
Updated:2015-10-01
Summary:Multiple integer overflows in the addVorbisCodecInfo function in matroska/MatroskaExtractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allow remote attackers to cause a denial of service (device inoperability) via crafted Matroska data, aka internal bug 21296336.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-189
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2015-3861

Source: CCN
Type: Google Web site
Android

Source: CCN
Type: Google Android GIT repositories
android Git repositories

Source: CONFIRM
Type: Vendor Advisory
https://android.googlesource.com/platform/frameworks/av/+/304ef91624e12661e7e35c2c0c235da84a73e9c0

Source: XF
Type: UNKNOWN
google-android-cve20153861-dos(109223)

Source: MLIST
Type: Vendor Advisory
[android-security-updates] 20150909 Nexus Security Bulletin (September 2015)

Source: CCN
Type: Google Gruops Forum, Wed, 9 Sep 2015 13:17:14 -0700 (PDT)
Nexus Security Bulletin (September 2015)

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2015-3861

Vulnerable Configuration:Configuration 1:
  • cpe:/o:google:android:*:*:*:*:*:*:*:* (Version <= 5.1)

  • Configuration CCN 1:
  • cpe:/o:google:android:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:2.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.1:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:3.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.3:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:4.4:*:*:*:*:*:*:*
  • OR cpe:/o:google:android:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.trusty:def:20153861000
    V
    CVE-2015-3861 on Ubuntu 14.04 LTS (trusty) - negligible.
    2015-09-30
    BACK
    google android *
    google android 2.2
    google android 2.3
    google android 3.0
    google android 3.1
    google android 3.2
    google android 4.0
    google android 4.2
    google android 4.3
    google android 4.4
    google android 5.0