First published: Fri Aug 05 2016(Updated: )
Integer overflow in codecs/on2/h264dec/source/h264bsd_dpb.c in libstagefright in mediaserver in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-08-01 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 28533562.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =6.0 | |
Android | =6.0.1 |
https://android.googlesource.com/platform/frameworks/av/+/590d1729883f700ab905cdc9ad850f3ddd7e1f56
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3819 has been classified as critical due to its potential to allow remote code execution or denial of service.
To fix CVE-2016-3819, users should update their Android devices to the latest available version, specifically versions 4.4.4, 5.0.2, 5.1.1, or later.
CVE-2016-3819 affects Android versions prior to 4.4.4, 5.0.2, 5.1.1, and 6.x before August 1, 2016.
CVE-2016-3819 can be exploited through crafted media files, potentially leading to memory corruption.
Any remote attacker with the ability to send crafted media files to unpatched Android devices can exploit CVE-2016-3819.