A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
References
Link | Resource |
---|---|
https://www.whatsapp.com/security/advisories/2021/ | Not Applicable Vendor Advisory |
https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: facebook
Published: 2022-02-02T11:59:31
Updated: 2022-02-02T11:59:31
Reserved: 2021-01-13T00:00:00
Link: CVE-2021-24043
JSON object: View
NVD Information
Status : Analyzed
Published: 2022-02-02T12:15:07.890
Modified: 2022-02-07T19:47:30.307
Link: CVE-2021-24043
JSON object: View
Redhat Information
No data.
CWE