| |
Vulnerability CVE-2021-24043
Published: 2022-02-02
Description: |
A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call. |
Type:
CWE-125 (Out-of-bounds Read)
CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
6.4/10 |
4.9/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Partial |
None |
Partial |
References: |
https://www.whatsapp.com/security/advisories/2021/
https://www.whatsapp.com/security/advisories/2022/
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|