Logo
Explore Help
Sign In
CalvinBackup/CVEs-PoC
1
0
Fork 0
You've already forked CVEs-PoC
mirror of https://github.com/0xMarcio/cve.git synced 2026-05-07 17:36:58 +02:00
Code Issues Packages Projects Releases Wiki Activity
Files
dc3bd6cd71a486f862e7cf4da52fce4cfeb10e52
CVEs-PoC/2015/CVE-2015-3864.md
T
0xMarcio 6a17b5b11e Update CVE sources 2024-08-30 20:52
2024-08-30 20:52:42 +00:00

1.3 KiB
Raw Blame History

CVE-2015-3864

Description

Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.

POC

Reference

  • https://www.exploit-db.com/exploits/38226/
  • https://www.exploit-db.com/exploits/39640/
  • https://www.exploit-db.com/exploits/40436/

Github

  • https://github.com/ARPSyndicate/cvemon
  • https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864
  • https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
  • https://github.com/HenryVHuang/CVE-2015-3864
  • https://github.com/HighW4y2H3ll/libstagefrightExploit
  • https://github.com/eudemonics/scaredycat
  • https://github.com/hac425xxx/heap-exploitation-in-real-world
  • https://github.com/hoangcuongflp/MobileSecurity2016-recap
  • https://github.com/pwnaccelerator/stagefright-cve-2015-3864
Reference in New Issue View Git Blame Copy Permalink
Powered by Gitea Version: 1.26.0 Page: 38ms Template: 3ms
Auto
English
Bahasa Indonesia Deutsch English Español Français Gaeilge Italiano Latviešu Magyar nyelv Nederlands Polski Português de Portugal Português do Brasil Suomi Svenska Türkçe Čeština Ελληνικά Български Русский Українська فارسی മലയാളം 日本語 简体中文 繁體中文(台灣) 繁體中文(香港) 한국어
Licenses API