{
  "name": "CVE-2015-3824",
  "CVE": [
    [
      "CVE-2015-3824",
      "Bulletin-CVE-2015-3824"
    ]
  ],
  "Coordinated_disclosure": "unknown",
  "Categories": [
    "Integer overflow in libstagefright when parsing the MPEG4 tx3g atom"
  ],
  "Details": [
    [
      "The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not properly restrict size addition, which allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via a crafted MPEG-4 tx3g atom, aka internal bug 20923261.",
      "NIST-CVE-2015-3824"
    ]
  ],
  "Discovered_on": [],
  "Discovered_by": [],
  "Submission": [
    {
      "by": "dcc52",
      "on": "2019-07-29"
    }
  ],
  "Reported_on": [
    [
      "2015-08-01",
      "Bulletin-CVE-2015-3824"
    ]
  ],
  "Fixed_on": [
    [
      "2015-05-04",
      "ANDROID-20923261"
    ]
  ],
  "Fix_released_on": [],
  "Affected_versions": [
    [
      "5.1 and below",
      "Bulletin-CVE-2015-3824"
    ]
  ],
  "Affected_devices": [],
  "Affected_versions_regexp": [
    "([1-4]\\.[0-9]\\.[0-9])|(5\\.[0-1]\\.[0-9])"
  ],
  "Affected_manufacturers": [
    [
      "all",
      "Bulletin-CVE-2015-3824"
    ]
  ],
  "Fixed_versions": [],
  "Fixed_versions_regexp": [
    ""
  ],
  "references": {
    "ANDROID-20923261": {
      "url": "https://android.googlesource.com/platform/frameworks/av/+/463a6f807e187828442949d1924e143cf07778c6"
    },
    "NIST-CVE-2015-3824": {
      "url": "https://nvd.nist.gov/vuln/data-feeds"
    },
    "Bulletin-CVE-2015-3824": {
      "url": "https://source.android.com/security/bulletin/2015-08-01.html"
    }
  },
  "Surface": [
    "remote"
  ],
  "Vector": [
    "memory-corruption"
  ],
  "Target": [
    "system-component"
  ],
  "Channel": [
    "remote"
  ],
  "Condition": [
    "malicious-file-viewed"
  ],
  "Privilege": [
    "system"
  ],
  "CWE": [
    [
      "CWE-119",
      "NIST-CVE-2015-3824"
    ]
  ]
}