CVE-2021-24043

A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:whatsapp:whatsapp:2.21.23.2:*:*:*:*:android:*:*
cpe:2.3:a:whatsapp:whatsapp:2.21.230.6:*:*:*:*:iphone_os:*:*
cpe:2.3:a:whatsapp:whatsapp:2.2145.0:*:*:*:desktop:*:*:*
cpe:2.3:a:whatsapp:whatsapp_business:2.21.23.2:*:*:*:*:android:*:*
cpe:2.3:a:whatsapp:whatsapp_business:2.21.230.7:*:*:*:*:iphone_os:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
References () https://www.whatsapp.com/security/advisories/2021/ - Not Applicable, Vendor Advisory () https://www.whatsapp.com/security/advisories/2021/ - Not Applicable, Vendor Advisory

Information

Published : 2022-02-02 12:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24043

Mitre link : CVE-2021-24043

CVE.ORG link : CVE-2021-24043


JSON object : View

Products Affected

whatsapp

  • whatsapp_business
  • whatsapp
CWE
CWE-125

Out-of-bounds Read