ID

VAR-E-201511-0182


CVE

cve_id:CVE-2015-7898

Trust: 2.4

sources: BID: 77430 // PACKETSTORM: 134951 // EXPLOIT-DB: 38610 // EDBNET: 59687

EDB ID

38610


TITLE

Samsung Galaxy S6 Samsung Gallery - GIF Parsing Crash - Android dos Exploit

Trust: 0.6

sources: EXPLOIT-DB: 38610

DESCRIPTION

Samsung Galaxy S6 Samsung Gallery - GIF Parsing Crash. CVE-2015-7898 . dos exploit for Android platform

Trust: 0.6

sources: EXPLOIT-DB: 38610

AFFECTED PRODUCTS

vendor:samsungmodel:galaxy s6 samsung galleryscope: - version: -

Trust: 1.6

vendor:samsungmodel:galaxy s6 samsung gallery gif parsingscope: - version: -

Trust: 0.5

vendor:samsungmodel:galaxy s6scope:eqversion:0

Trust: 0.3

sources: BID: 77430 // PACKETSTORM: 134951 // EXPLOIT-DB: 38610 // EDBNET: 59687

EXPLOIT

Source: https://code.google.com/p/google-security-research/issues/detail?id=500

There is a crash when the Samsung Gallery application load the attached GIF, colormap.gif.

D/skia (10905): GIF - Parse error
D/skia (10905): --- decoder->decode returned false
F/libc (10905): Fatal signal 11 (SIGSEGV), code 2, fault addr 0x89f725ac in tid 11276 (thread-pool-0)
I/DEBUG ( 2958): pid: 10905, tid: 11276, name: thread-pool-0 >>> com.sec.android.gallery3d <<<
I/DEBUG ( 2958): signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0x89f725ac
I/DEBUG ( 2958): x0 0000000000000001 x1 0000000089f725ac x2 0000000000000000 x3 00000000fff9038c
I/DEBUG ( 2958): x4 0000007f9c300000 x5 000000000000001f x6 0000000000000001 x7 0000007f9c620048
I/DEBUG ( 2958): x8 0000000000000000 x9 0000000000000000 x10 0000000000000080 x11 0000000000003758
I/DEBUG ( 2958): x12 0000000000000020 x13 0000000000000020 x14 00000000000000a5 x15 000000000000001f
I/DEBUG ( 2958): x16 00000000ffffe4e3 x17 00000000000000a5 x18 0000007f9c300000 x19 0000007f9c61fc00
I/DEBUG ( 2958): x20 0000007f9c664080 x21 0000000089e76b2c x22 000000000000003b x23 0000000000000001
I/DEBUG ( 2958): x24 0000000000000020 x25 0000000000000020 x26 0000000000000020 x27 0000007f9c664080
I/DEBUG ( 2958): x28 00000000000001da x29 0000000032e89ae0 x30 0000007faad70e64
I/DEBUG ( 2958): sp 0000007f9cfff170 pc 0000007faad72dbc pstate 0000000080000000
I/DEBUG ( 2958):
I/DEBUG ( 2958): backtrace:
I/DEBUG ( 2958): #00 pc 000000000002ddbc /system/lib64/libSecMMCodec.so (ColorMap+200)
I/DEBUG ( 2958): #01 pc 000000000002be60 /system/lib64/libSecMMCodec.so (decodeGIF+340)
I/DEBUG ( 2958): #02 pc 000000000000c90c /system/lib64/libSecMMCodec.so (Java_com_sec_samsung_gallery_decoder_SecMMCodecInterface_nativeDecode+436)
I/DEBUG ( 2958): #03 pc 000000000042ec00 /system/priv-app/SecGallery2015/arm64/SecGallery2015.odex

To reproduce, download the file and open it in Gallery

Proof of Concept:
https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/38610.zip

Trust: 1.0

sources: EXPLOIT-DB: 38610

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 38610

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 38610

TYPE

GIF Parsing Crash

Trust: 1.6

sources: EXPLOIT-DB: 38610 // EDBNET: 59687

TAGS

tag:exploit

Trust: 0.5

sources: PACKETSTORM: 134951

CREDITS

Google Security Research

Trust: 0.6

sources: EXPLOIT-DB: 38610

EXTERNAL IDS

db:NVDid:CVE-2015-7898

Trust: 2.4

db:EXPLOIT-DBid:38610

Trust: 1.6

db:EDBNETid:59687

Trust: 0.6

db:PACKETSTORMid:134951

Trust: 0.5

db:BIDid:77430

Trust: 0.3

sources: BID: 77430 // PACKETSTORM: 134951 // EXPLOIT-DB: 38610 // EDBNET: 59687

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2015-7898

Trust: 2.1

url:https://code.google.com/p/google-security-research/issues/detail?id=500

Trust: 1.0

url:https://www.exploit-db.com/exploits/38610/

Trust: 0.6

url:http://www.samsung.com/

Trust: 0.3

url:https://code.google.com/p/google-security-research/issues/detail?id=500&q=samsung

Trust: 0.3

sources: BID: 77430 // PACKETSTORM: 134951 // EXPLOIT-DB: 38610 // EDBNET: 59687

SOURCES

db:BIDid:77430
db:PACKETSTORMid:134951
db:EXPLOIT-DBid:38610
db:EDBNETid:59687

LAST UPDATE DATE

2022-07-27T09:51:53.461000+00:00


SOURCES UPDATE DATE

db:BIDid:77430date:2015-11-02T00:00:00

SOURCES RELEASE DATE

db:BIDid:77430date:2015-11-02T00:00:00
db:PACKETSTORMid:134951date:2015-12-18T00:42:45
db:EXPLOIT-DBid:38610date:2015-11-03T00:00:00
db:EDBNETid:59687date:2015-11-03T00:00:00