Security News > 2015 > September > Attack code for critical Android Stagefright flaw published (Help Net Security)

2015-09-10 09:34
After having graciously waited for quite a while to publish the exploit for the Android Stagefright vulnerability (CVE-2015-1538) so that Google, mobile carriers and device manufacturers might push ou...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/kRrVMjxnZIA/secworld.php
Related news
- Critical PostgreSQL bug tied to zero-day attack on US Treasury (source)
- Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV) (source)
- CrowdStrike Security Report: Generative AI Powers Social Engineering Attacks (source)
- 89% of Enterprise GenAI Usage Is Invisible to Organizations Exposing Critical Security Risks, New Report Reveals (source)
- Google's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities (source)
- CISA tags critical Ivanti EPM flaws as actively exploited in attacks (source)
- Critical PHP RCE vulnerability mass exploited in new attacks (source)
- Critical RCE flaw in Apache Tomcat actively exploited in attacks (source)
- Stealthy Apache Tomcat Critical Exploit Bypasses Security Filters: Are You at Risk? (source)
- Critical GitHub Attack (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-10-01 | CVE-2015-1538 | Numeric Errors vulnerability in Google Android Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | 0.0 |