First published: Tue Jul 02 2024(Updated: )
Improper input validation?in parsing RTCP SR packet in librtp.so prior to SMR Jul-2024 Release 1 allows remote attackers to trigger temporary denial of service. User interaction is required for triggering this vulnerability.
Credit: mobile.security@samsung.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samsung Android | =12.0 | |
Samsung Android | =12.0-smr-apr-2022-r1 | |
Samsung Android | =12.0-smr-apr-2023-r1 | |
Samsung Android | =12.0-smr-apr-2024-r1 | |
Samsung Android | =12.0-smr-aug-2022-r1 | |
Samsung Android | =12.0-smr-aug-2023-r1 | |
Samsung Android | =12.0-smr-dec-2021-r1 | |
Samsung Android | =12.0-smr-dec-2022-r1 | |
Samsung Android | =12.0-smr-dec-2023-r1 | |
Samsung Android | =12.0-smr-feb-2022-r1 | |
Samsung Android | =12.0-smr-feb-2023-r1 | |
Samsung Android | =12.0-smr-feb-2024-r1 | |
Samsung Android | =12.0-smr-jan-2022-r1 | |
Samsung Android | =12.0-smr-jan-2023-r1 | |
Samsung Android | =12.0-smr-jan-2024-r1 | |
Samsung Android | =12.0-smr-jul-2022-r1 | |
Samsung Android | =12.0-smr-jul-2023-r1 | |
Samsung Android | =12.0-smr-jun-2022-r1 | |
Samsung Android | =12.0-smr-jun-2023-r1 | |
Samsung Android | =12.0-smr-jun-2024-r1 | |
Samsung Android | =12.0-smr-mar-2022-r1 | |
Samsung Android | =12.0-smr-mar-2023-r1 | |
Samsung Android | =12.0-smr-mar-2024-r1 | |
Samsung Android | =12.0-smr-may-2022-r1 | |
Samsung Android | =12.0-smr-may-2023-r1 | |
Samsung Android | =12.0-smr-may-2024-r1 | |
Samsung Android | =12.0-smr-nov-2021-r1 | |
Samsung Android | =12.0-smr-nov-2022-r1 | |
Samsung Android | =12.0-smr-nov-2023-r1 | |
Samsung Android | =12.0-smr-oct-2022-r1 | |
Samsung Android | =12.0-smr-oct-2023-r1 | |
Samsung Android | =12.0-smr-sep-2022-r1 | |
Samsung Android | =12.0-smr-sep-2023-r1 | |
Samsung Android | =13.0 | |
Samsung Android | =13.0-smr-apr-2023-r1 | |
Samsung Android | =13.0-smr-apr-2024-r1 | |
Samsung Android | =13.0-smr-aug-2023-r1 | |
Samsung Android | =13.0-smr-dec-2022-r1 | |
Samsung Android | =13.0-smr-dec-2023-r1 | |
Samsung Android | =13.0-smr-feb-2023-r1 | |
Samsung Android | =13.0-smr-feb-2024-r1 | |
Samsung Android | =13.0-smr-jan-2023-r1 | |
Samsung Android | =13.0-smr-jan-2024-r1 | |
Samsung Android | =13.0-smr-jul-2023-r1 | |
Samsung Android | =13.0-smr-jun-2023-r1 | |
Samsung Android | =13.0-smr-jun-2024-r1 | |
Samsung Android | =13.0-smr-mar-2023-r1 | |
Samsung Android | =13.0-smr-mar-2024-r1 | |
Samsung Android | =13.0-smr-may-2023-r1 | |
Samsung Android | =13.0-smr-may-2024-r1 | |
Samsung Android | =13.0-smr-nov-2022-r1 | |
Samsung Android | =13.0-smr-nov-2023-r1 | |
Samsung Android | =13.0-smr-oct-2022-r1 | |
Samsung Android | =13.0-smr-oct-2023-r1 | |
Samsung Android | =13.0-smr-sep-2023-r1 | |
Samsung Android | =14.0 | |
Samsung Android | =14.0-smr-apr-2023-r1 | |
Samsung Android | =14.0-smr-apr-2024-r1 | |
Samsung Android | =14.0-smr-aug-2023-r1 | |
Samsung Android | =14.0-smr-dec-2022-r1 | |
Samsung Android | =14.0-smr-dec-2023-r1 | |
Samsung Android | =14.0-smr-feb-2023-r1 | |
Samsung Android | =14.0-smr-jan-2023-r1 | |
Samsung Android | =14.0-smr-jan-2024-r1 | |
Samsung Android | =14.0-smr-jul-2023-r1 | |
Samsung Android | =14.0-smr-jun-2023-r1 | |
Samsung Android | =14.0-smr-jun-2024-r1 | |
Samsung Android | =14.0-smr-mar-2023-r1 | |
Samsung Android | =14.0-smr-mar-2024-r1 | |
Samsung Android | =14.0-smr-may-2023-r1 | |
Samsung Android | =14.0-smr-may-2024-r1 | |
Samsung Android | =14.0-smr-nov-2022-r1 | |
Samsung Android | =14.0-smr-nov-2023-r1 | |
Samsung Android | =14.0-smr-oct-2022-r1 | |
Samsung Android | =14.0-smr-oct-2023-r1 | |
Samsung Android | =14.0-smr-sep-2023-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34588 has a severity rating that allows remote attackers to trigger a temporary denial of service.
To mitigate CVE-2024-34588, users should update to the SMR Jul-2024 Release 1 or later.
CVE-2024-34588 affects Samsung Android versions 12.0, 13.0, and 14.0 prior to the SMR Jul-2024 Release 1.
CVE-2024-34588 is categorized as an improper input validation vulnerability in parsing RTCP SR packets.
Yes, user interaction is required to trigger the vulnerability described in CVE-2024-34588.