Security News > 2015 > September > Attack code for critical Android Stagefright flaw published (Help Net Security)
2015-09-10 09:34
After having graciously waited for quite a while to publish the exploit for the Android Stagefright vulnerability (CVE-2015-1538) so that Google, mobile carriers and device manufacturers might push ou...
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/kRrVMjxnZIA/secworld.php
Related news
- FBI: Critical infrastructure suffers spike in ransomware attacks (source)
- Public anxiety mounts over critical infrastructure resilience to cyber attacks (source)
- US sanctions APT31 hackers behind critical infrastructure attacks (source)
- Drozer: Open-source Android security assessment framework (source)
- Vultur banking malware for Android poses as McAfee Security app (source)
- Cyber attacks on critical infrastructure show advanced tactics and new capabilities (source)
- Critical Security Flaw Found in Popular LayerSlider WordPress Plugin (source)
- Critical RCE bug in 92,000 D-Link NAS devices now exploited in attacks (source)
- Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks (source)
- Critical Rust flaw enables Windows command injection attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-10-01 | CVE-2015-1538 | Numeric Errors vulnerability in Google Android Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496. | 10.0 |