Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968", "name": "https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968", "tags": ["Vendor Advisory"], "refsource": "CONFIRM"}, {"url": "https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ", "name": "[android-security-updates] 20150909 Nexus Security Bulletin (September 2015)", "tags": ["Vendor Advisory"], "refsource": "MLIST"}, {"url": "https://blog.zimperium.com/cve-2015-3864-metasploit-module-now-available-for-testing/", "name": "https://blog.zimperium.com/cve-2015-3864-metasploit-module-now-available-for-testing/", "tags": ["Release Notes", "Third Party Advisory"], "refsource": "MISC"}, {"url": "http://www.securityfocus.com/bid/76682", "name": "76682", "tags": [], "refsource": "BID"}, {"url": "https://blog.zimperium.com/reflecting-on-stagefright-patches/", "name": "https://blog.zimperium.com/reflecting-on-stagefright-patches/", "tags": [], "refsource": "MISC"}, {"url": "https://www.exploit-db.com/exploits/40436/", "name": "40436", "tags": [], "refsource": "EXPLOIT-DB"}, {"url": "https://www.exploit-db.com/exploits/39640/", "name": "39640", "tags": [], "refsource": "EXPLOIT-DB"}, {"url": "https://www.exploit-db.com/exploits/38226/", "name": "38226", "tags": [], "refsource": "EXPLOIT-DB"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-189"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2015-3864", "ASSIGNER": "security@android.com"}}, "impact": {"baseMetricV2": {"cvssV2": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "severity": "HIGH", "impactScore": 10.0, "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}}, "publishedDate": "2015-10-01T00:59Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "5.1"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2017-09-16T01:29Z"}