FKIE_CVE-2021-24043

Vulnerability from fkie_nvd - Published: 2022-02-02 12:15 - Updated: 2024-11-21 05:52
Severity ?
Summary
A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
Impacted products
Vendor Product Version
whatsapp whatsapp 2.21.23.2
whatsapp whatsapp 2.21.230.6
whatsapp whatsapp 2.2145.0
whatsapp whatsapp_business 2.21.23.2
whatsapp whatsapp_business 2.21.230.7

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.21.23.2:*:*:*:*:android:*:*",
              "matchCriteriaId": "E2C25B9E-58CC-4252-BD71-5BE434424C25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.21.230.6:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "A008CAA3-8937-4AB2-8A94-D31CFD982BC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.2145.0:*:*:*:desktop:*:*:*",
              "matchCriteriaId": "FCD713BE-B324-4668-B4EC-6967987DD89C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:2.21.23.2:*:*:*:*:android:*:*",
              "matchCriteriaId": "54C89209-4539-4E2C-A4C3-C88489CD3D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:2.21.230.7:*:*:*:*:iphone_os:*:*",
              "matchCriteriaId": "C5B4676D-A585-4F23-805B-A5CC995A498B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de l\u00edmites ausente en el c\u00f3digo de an\u00e1lisis de banderas RTCP anterior a WhatsApp para Android versi\u00f3n v2.21.23.2, WhatsApp Business para Android versi\u00f3n v2.21.23.2, WhatsApp para iOS versi\u00f3n v2.21.230.6, WhatsApp Business para iOS versi\u00f3n 2.21.230.7 y WhatsApp Desktop versi\u00f3n v2.2145.0, podr\u00eda haber permitido una lectura de pila fuera de l\u00edmites si un usuario enviaba un paquete RTCP malformado durante una llamada establecida"
    }
  ],
  "id": "CVE-2021-24043",
  "lastModified": "2024-11-21T05:52:16.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-02T12:15:07.890",
  "references": [
    {
      "source": "cve-assign@fb.com",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "https://www.whatsapp.com/security/advisories/2021/"
    },
    {
      "source": "nvd@nist.gov",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.whatsapp.com/security/advisories/2022/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "https://www.whatsapp.com/security/advisories/2021/"
    }
  ],
  "sourceIdentifier": "cve-assign@fb.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…