CVE-2015-3864
Android <5.1.1 - RCE
Title source: llmDescription
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
Exploits (9)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteandroid
https://www.exploit-db.com/exploits/40436
exploitdb
WORKING POC
VERIFIED
by Google Security Research · pythonremoteandroid
https://www.exploit-db.com/exploits/38226
nomisec
WRITEUP
3 stars
by pwnaccelerator · poc
https://github.com/pwnaccelerator/stagefright-cve-2015-3864
nomisec
WRITEUP
1 stars
by Bhathiya404 · poc
https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864
metasploit
WORKING POC
NORMAL
by jduck, NorthBit · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/android/browser/stagefright_mp4_tx3g_64bit.rb
References (8)
Scores
EPSS
0.8703
EPSS Percentile
99.4%
Details
CWE
CWE-189
Status
published
Products (1)
google/android
< 5.1
Published
Oct 01, 2015
Tracked Since
Feb 18, 2026