The Call Blocker application 6.6.3 for Android incorrectly opens a key component that an attacker can use to inject large amounts of dirty data into the application's database. When the application starts, it loads the data from the database into memory. Once the attacker injects too much data, the application triggers an OOM error and crashes, resulting in a persistent denial of service.
References
Link | Resource |
---|---|
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls | Product |
https://www.call-blocker.info/ | Product |
https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md | Exploit Third Party Advisory |
https://play.google.com/store/apps/details?id=com.cuiet.blockCalls | Product |
https://www.call-blocker.info/ | Product |
Configurations
History
No history.
Information
Published : 2023-05-30 23:15
Updated : 2025-01-13 21:15
NVD link : CVE-2023-29726
Mitre link : CVE-2023-29726
CVE.ORG link : CVE-2023-29726
JSON object : View
Products Affected
applika
- call_blocker
CWE
CWE-404
Improper Resource Shutdown or Release