CVE-2015-3828
Description
The MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM), which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted 3GPP metadata, aka internal bug 20923261, a related issue to CVE-2015-3826.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Remote code execution or DoS via integer underflow in Android libstagefright's MPEG4Extractor when processing crafted 3GPP metadata; affects Android before 5.1.1 LMY48I.
Vulnerability
An integer underflow vulnerability exists in the MPEG4Extractor::parse3GPPMetaData function in MPEG4Extractor.cpp within Android's libstagefright library. The function does not enforce a minimum size for UTF-16 strings containing a Byte Order Mark (BOM). This allows a crafted 3GPP metadata entry to trigger an integer underflow during a subtraction operation, leading to memory corruption. The vulnerability affects Android versions before 5.1.1 LMY48I [1].
Exploitation
An attacker can exploit this vulnerability by delivering a specially crafted media file (e.g., via MMS, web, or other messaging channels) that contains malformed 3GPP metadata. No authentication is required; the attack is remote and user interaction is minimal (the victim simply needs to process the media file using a vulnerable version of Android's media server). The integer underflow arises when the code subtracts a small value from an already small size, resulting in a large positive value that leads to a linear byteswap operation in the subsequent framedata decoding code [1].
Impact
Successful exploitation can result in arbitrary code execution with the privileges of the mediaserver process, or a denial of service (crash) due to memory corruption. The attacker gains the ability to execute arbitrary code or cause system instability, potentially compromising the device's confidentiality, integrity, and availability [1].
Mitigation
Google released a fix in Android 5.1.1 LMY48I, which includes commit f4f7e0c102819f039ebb1972b3dba1d3186bc1d1 that introduces a bound check to prevent the integer underflow. Users should update to this or a later version. No workarounds are available. The vulnerability is not known to be listed in CISA's Known Exploited Vulnerabilities (KEV) catalog as of the publication date [1].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
3Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- android.googlesource.com/platform/frameworks/av/+/f4f7e0c102819f039ebb1972b3dba1d3186bc1d1nvdVendor Advisory
- groups.google.com/forum/message/rawnvdVendor Advisory
- www.huawei.com/en/psirt/security-advisories/hw-448928nvd
- www.securityfocus.com/bid/76052nvd
- www.securitytracker.com/id/1033094nvd
- www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htmnvd
News mentions
0No linked articles in our index yet.