CVE-2015-1538
Severity Level: High
AppRisk Coverage: Yes
Type: Vulnerability
Aliases:
- Android-20139950
- Stagefright vulnerability
Platform: Android
File size (bytes): N/A
Filename: N/A
App title: N/A
MD5 Hash: N/A
SHA1 hash: N/A
Affected CVE:
- CVE-2015-1538
- CVE-2015-1539
Details or analysis:
This is one of several vulnerabilities, also known as “Stagefright vulnerabilities”, in the Android library “libstagefright“. The library is responsible for processing multimedia files. This specific vulnerability is due to an integer overflow in the “SampleTable::setSampleToChunkParams” function in “SampleTable.cpp” within libstagefright and affects Android versions prior to 5.1.1.
If successfully exploited, each vulnerability could allow a malicious application or individual to execute arbitrary code with elevated privileges, via crafted atoms in MPEG-4 data. In an attack scenario involving MMS, an attacker could send attack code via a multimedia file that, when received, could auto-execute.
The vulnerabilities affect Android OS versions from 2.2 (Froyo) and prior to 5.1.1 r9 (Lollipop).
The Android Open Source Project (AOSP) has released Android 5.1.1 r9 to address the vulnerabilities. Android Marshmallow with Security Patch Level of November 1, 2015 or later also addresses the vulnerabilities.
For more information, see the reference links.
Reference:
- Security