CVE-2021-41193

wire-avs is the audio visual signaling (AVS) component of Wire, an open-source messenger. A remote format string vulnerability in versions prior to 7.1.12 allows an attacker to cause a denial of service or possibly execute arbitrary code. The issue has been fixed in wire-avs 7.1.12. There are currently no known workarounds.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wire:wire-audio_video_signaling:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe - Patch, Third Party Advisory () https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe - Patch, Third Party Advisory
References () https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv - Patch, Third Party Advisory () https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv - Patch, Third Party Advisory

Information

Published : 2022-03-01 19:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-41193

Mitre link : CVE-2021-41193

CVE.ORG link : CVE-2021-41193


JSON object : View

Products Affected

wire

  • wire-audio_video_signaling
CWE
CWE-134

Use of Externally-Controlled Format String