# N/A
## 漏洞概述
存在整数溢出漏洞,该漏洞位于Android的libstagefright库中的SampleTable::setSampleToChunkParams函数。通过精心构造的MP4数据中的atoms可以触发未检查的乘法操作,从而允许远程攻击者执行任意代码。
## 影响版本
Android版本低于5.1.1 LMY48I
## 漏洞细节
该漏洞存在于SampleTable.cpp文件内的SampleTable::setSampleToChunkParams函数中。通过在MP4数据中包含精心构造的atoms,攻击者可以触发一个未检查乘法操作,导致整数溢出。这与CVE-2015-4496为相关问题,内部Bug ID为20139950。
## 漏洞影响
该漏洞允许远程攻击者执行任意代码,潜在地导致系统被完全控制或出现严重的安全问题。需要及时更新受影响版本,以防止被利用。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution | https://github.com/oguzhantopgul/cve-2015-1538-1 | POC详情 |
| 2 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution | https://github.com/renjithsasidharan/cve-2015-1538-1 | POC详情 |
| 3 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution | https://github.com/jduck/cve-2015-1538-1 | POC详情 |
| 4 | Cve-2015-1538-1 | https://github.com/niranjanshr13/Stagefright-cve-2015-1538-1 | POC详情 |
| 5 | Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538 | https://github.com/Tharana/Android-vulnerability-exploitation | POC详情 |
| 6 | Local Root vulnerability- CVE-2019-13272 / Security Bypass Vulnerability – CVE-2019-14287/Google Android - 'Stagefright' Remote Code Execution - CVE-2015-1538 | https://github.com/Tharana/vulnerability-exploitation | POC详情 |
| 7 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution | https://github.com/xsleaksiki/cve | POC详情 |
Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.