{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2015-08-12T00:00:00.000Z","descriptions":[{"lang":"en","value":"Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-09-20T09:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html"},{"name":"1033094","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1033094"},{"name":"76052","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/76052"},{"name":"38124","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/38124/"},{"tags":["x_refsource_CONFIRM"],"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.huawei.com/en/psirt/security-advisories/hw-448928"},{"name":"[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)","tags":["mailing-list","x_refsource_MLIST"],"url":"https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-1538","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398","refsource":"CONFIRM","url":"https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398"},{"name":"http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html"},{"name":"1033094","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1033094"},{"name":"76052","refsource":"BID","url":"http://www.securityfocus.com/bid/76052"},{"name":"38124","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/38124/"},{"name":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm","refsource":"CONFIRM","url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm"},{"name":"http://www.huawei.com/en/psirt/security-advisories/hw-448928","refsource":"CONFIRM","url":"http://www.huawei.com/en/psirt/security-advisories/hw-448928"},{"name":"[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)","refsource":"MLIST","url":"https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T04:47:16.832Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html"},{"name":"1033094","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1033094"},{"name":"76052","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/76052"},{"name":"38124","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/38124/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.huawei.com/en/psirt/security-advisories/hw-448928"},{"name":"[android-security-updates] 20150812 Nexus Security Bulletin (August 2015)","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2015-1538","datePublished":"2015-10-01T00:00:00.000Z","dateReserved":"2015-02-06T00:00:00.000Z","dateUpdated":"2024-08-06T04:47:16.832Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}