Skip to content

Commit 81373d4

Browse files
committed
Fill in more of the vulnerability information
1 parent e737013 commit 81373d4

File tree

1 file changed

+174
-4
lines changed

1 file changed

+174
-4
lines changed

app/src/main/assets/vuln_map.json

Lines changed: 174 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@
2222
"altnames": [
2323
"Linux L2TP Socket Vuln"
2424
],
25-
"description": "icmp socket of linux kernel... blah blah blah...",
25+
"description": "Type confusion bug l2tp socket implementation",
2626
"impact": "Local privilege escalation to kernel/root from an unprivileged app",
2727
"external_links": [
2828
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-4943",
@@ -125,7 +125,7 @@
125125
"altnames": [
126126
"ANDROID-21437603/21583894"
127127
],
128-
"description": "Local object serilization attack. The OpenSSLX509Certificate class contains native pointers as class members and they are not marked as transient. A Local app can craft a serialized object and pass through binder and ultimately gain code execution as system",
128+
"description": "Local object serialization attack. The OpenSSLX509Certificate class contains native pointers as class members and they are not marked as transient. A Local app can craft a serialized object and pass through binder and ultimately gain code execution as system",
129129
"impact": "Local unprivilidged app to system_server",
130130
"external_links": [
131131
"https://securityintelligence.com/one-class-to-rule-them-all-new-android-serialization-vulnerability-gives-underprivileged-apps-super-status/",
@@ -243,8 +243,8 @@
243243
],
244244
"cvedate": "06/07/2014"
245245
},
246-
"Samsung WifiCredService remote code execution": {
247-
"cve": "Samsung WifiCredService remote code execution",
246+
"CVE-2015-7888": {
247+
"cve": "CVE-2015-7888",
248248
"altnames": [
249249
""
250250
],
@@ -307,5 +307,175 @@
307307
"https://android.googlesource.com/platform/build/+/refs/tags/android-2.3.7_r1"
308308
],
309309
"cvedate": "01/27/2012"
310+
},
311+
"CVE-2015-1538-1": {
312+
"cve": "CVE-2015-1538",
313+
"altnames": [
314+
"Stagefright"
315+
],
316+
"description": "A media processing issue that can be exploited for code execution",
317+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
318+
"external_links": [
319+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
320+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
321+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
322+
],
323+
"cvssv2": 10,
324+
"patch": [
325+
],
326+
"cvedate": "09/30/2015"
327+
},
328+
"CVE-2015-1538-2": {
329+
"cve": "CVE-2015-1538",
330+
"altnames": [
331+
"Stagefright"
332+
],
333+
"description": "A media processing issue that can be exploited for code execution",
334+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
335+
"external_links": [
336+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
337+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
338+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
339+
],
340+
"cvssv2": 10,
341+
"patch": [
342+
],
343+
"cvedate": "09/30/2015"
344+
},
345+
"CVE-2015-1538-3": {
346+
"cve": "CVE-2015-1538",
347+
"altnames": [
348+
"Stagefright"
349+
],
350+
"description": "A media processing issue that can be exploited for code execution",
351+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
352+
"external_links": [
353+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
354+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
355+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
356+
],
357+
"cvssv2": 10,
358+
"patch": [
359+
],
360+
"cvedate": "09/30/2015"
361+
},
362+
"CVE-2015-1538-4": {
363+
"cve": "CVE-2015-1538",
364+
"altnames": [
365+
"Stagefright"
366+
],
367+
"description": "A media processing issue that can be exploited for code execution",
368+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
369+
"external_links": [
370+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1538",
371+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
372+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
373+
],
374+
"cvssv2": 10,
375+
"patch": [
376+
],
377+
"cvedate": "09/30/2015"
378+
},
379+
"CVE-2015-1539": {
380+
"cve": "CVE-2015-1539",
381+
"altnames": [
382+
"Stagefright"
383+
],
384+
"description": "A media processing issue that can be exploited for code execution",
385+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
386+
"external_links": [
387+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-1539",
388+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
389+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
390+
],
391+
"cvssv2": 10,
392+
"patch": [
393+
],
394+
"cvedate": "09/30/2015"
395+
},
396+
"CVE-2015-3824": {
397+
"cve": "CVE-2015-3824",
398+
"altnames": [
399+
"Stagefright"
400+
],
401+
"description": "A media processing issue that can be exploited for code execution",
402+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
403+
"external_links": [
404+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3824",
405+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
406+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
407+
],
408+
"cvssv2": 10,
409+
"patch": [
410+
],
411+
"cvedate": "09/30/2015"
412+
},
413+
"CVE-2015-3828": {
414+
"cve": "CVE-2015-3828",
415+
"altnames": [
416+
"Stagefright"
417+
],
418+
"description": "A media processing issue that can be exploited for code execution",
419+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
420+
"external_links": [
421+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3828",
422+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
423+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
424+
],
425+
"cvssv2": 10,
426+
"patch": [
427+
],
428+
"cvedate": "09/30/2015"
429+
},
430+
"CVE-2015-3829": {
431+
"cve": "CVE-2015-3829",
432+
"altnames": [
433+
"Stagefright"
434+
],
435+
"description": "A media processing issue that can be exploited for code execution",
436+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
437+
"external_links": [
438+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3829",
439+
"https://blog.zimperium.com/stagefright-vulnerability-details-stagefright-detector-tool-released/",
440+
"https://en.wikipedia.org/wiki/Stagefright_(bug)"
441+
],
442+
"cvssv2": 10,
443+
"patch": [
444+
],
445+
"cvedate": "09/30/2015"
446+
},
447+
"sf-itunes-poc": {
448+
"cve": "sf-itunes-poc",
449+
"altnames": [
450+
"Stagefright"
451+
],
452+
"description": "Stagefright bug: A media processing issue that can be exploited for code execution",
453+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
454+
"external_links": [
455+
"https://gist.github.com/worawit/f6fb016997bdd6b9e414"
456+
],
457+
"cvssv2": 10,
458+
"patch": [
459+
"https://android.googlesource.com/platform/frameworks/av/+/2b50b7aa7d16014ccf35db7a7b4b5e84f7b4027c"
460+
],
461+
"cvedate": "09/30/2015"
462+
},
463+
"CVE-2015-3864": {
464+
"cve": "CVE-2015-3864",
465+
"altnames": [
466+
"Stagefright"
467+
],
468+
"description": "This a stagefright bug exploiting a failed patch for the same issue",
469+
"impact": "Allows remote attackers to execute arbitrary code via crafted MPEG-4 data",
470+
"external_links": [
471+
"https://blog.exodusintel.com/2015/08/13/stagefright-mission-accomplished/",
472+
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3864",
473+
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3864"
474+
],
475+
"cvssv2": 10,
476+
"patch": [
477+
"https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968"
478+
],
479+
"cvedate": "09/30/2015"
310480
}
311481
}

0 commit comments

Comments
 (0)