SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (VoIP/Phone/FAX)  >   Google Android Vendors:   Google
Google Android MMS Media Processing Flaw Lets Remote Users Execute Arbitrary Code on the Target System
SecurityTracker Alert ID:  1033094
SecurityTracker URL:  http://securitytracker.com/id/1033094
CVE Reference:   CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, CVE-2015-3829   (Links to External Site)
Date:  Jul 28 2015
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.2 and after
Description:   Multiple vulnerabilities were reported in Google Android. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted data via a MMS message to trigger flaws in the Stagefright media engine and execute arbitrary code on the target system.

The original advisory [press release] is available at:

http://blog.zimperium.com/experts-found-a-unicorn-in-the-heart-of-android/

Joshua J. Drake of Zimperium zLabs reported these vulnerabilities.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a source code fix.

The source code fix is being deployed by Android OS distributors.

Vendor URL:  www.android.com/ (Links to External Site)
Cause:   Not specified

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC