Security News > 2015 > September > Attack code for critical Android Stagefright flaw published (Help Net Security)

2015-09-10 09:34
After having graciously waited for quite a while to publish the exploit for the Android Stagefright vulnerability (CVE-2015-1538) so that Google, mobile carriers and device manufacturers might push ou...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/kRrVMjxnZIA/secworld.php
Related news
- New Android malware steals your credit cards for NFC relay attacks (source)
- SuperCard X Android Malware Enables Contactless ATM and PoS Fraud via NFC Relay Attacks (source)
- Android Improves Its Security (source)
- Linux 'io_uring' security blindspot allows stealthy rootkit attacks (source)
- SAP fixes critical Netweaver flaw exploited in attacks (source)
- Majority of Browser Extensions Pose Critical Security Risk, A New Report Reveals (source)
- Fortinet fixes critical zero-day exploited in FortiVoice attacks (source)
- Android 16 expands 'Advanced Protection' with device-level security (source)
- Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU (source)
- New PathWiper Data Wiper Malware Disrupts Ukrainian Critical Infrastructure in 2025 Attack (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-10-01 | CVE-2015-1538 | Numeric Errors vulnerability in Google Android Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | 0.0 |