CVE-2015-3864

Android <5.1.1 - RCE

Title source: llm

Description

Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.

Exploits (9)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremoteandroid
https://www.exploit-db.com/exploits/40436
exploitdb WORKING POC VERIFIED
by Google Security Research · pythonremoteandroid
https://www.exploit-db.com/exploits/38226
exploitdb WORKING POC
by NorthBit · textremoteandroid
https://www.exploit-db.com/exploits/39640
nomisec WORKING POC 17 stars
by eudemonics · poc
https://github.com/eudemonics/scaredycat
nomisec WRITEUP 3 stars
by pwnaccelerator · poc
https://github.com/pwnaccelerator/stagefright-cve-2015-3864
nomisec WRITEUP 1 stars
by Bhathiya404 · poc
https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864
nomisec NO CODE
by Cmadhushanka · poc
https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
nomisec WORKING POC
by HenryVHuang · poc
https://github.com/HenryVHuang/CVE-2015-3864
metasploit WORKING POC NORMAL
by jduck, NorthBit · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb

Scores

EPSS 0.8703
EPSS Percentile 99.4%

Details

CWE
CWE-189
Status published
Products (1)
google/android < 5.1
Published Oct 01, 2015
Tracked Since Feb 18, 2026