A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
References
Link | Resource |
---|---|
https://www.whatsapp.com/security/advisories/2021/ | Not Applicable Vendor Advisory |
https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory |
https://www.whatsapp.com/security/advisories/2021/ | Not Applicable Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.whatsapp.com/security/advisories/2021/ - Not Applicable, Vendor Advisory |
Information
Published : 2022-02-02 12:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24043
Mitre link : CVE-2021-24043
CVE.ORG link : CVE-2021-24043
JSON object : View
Products Affected
- whatsapp_business
CWE
CWE-125
Out-of-bounds Read