Security News > 2015 > September > Attack code for critical Android Stagefright flaw published (Help Net Security)

2015-09-10 09:34
After having graciously waited for quite a while to publish the exploit for the Android Stagefright vulnerability (CVE-2015-1538) so that Google, mobile carriers and device manufacturers might push ou...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/kRrVMjxnZIA/secworld.php
Related news
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- CISA warns of critical Oracle, Mitel flaws exploited in attacks (source)
- The ongoing evolution of the CIS Critical Security Controls (source)
- Hackers exploit critical Aviatrix Controller RCE flaw in attacks (source)
- Critical SimpleHelp Flaws Allow File Theft, Privilege Escalation, and RCE Attacks (source)
- Patch Tuesday: January 2025 Security Update Patches Exploited Elevation of Privilege Attacks (source)
- Balancing usability and security in the fight against identity-based attacks (source)
- Security pros more confident about fending off ransomware, despite being battered by attacks (source)
- Critical Cacti Security Flaw (CVE-2025-22604) Enables Remote Code Execution (source)
- Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891) (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-10-01 | CVE-2015-1538 | Numeric Errors vulnerability in Google Android Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | 0.0 |