Permission control vulnerability in calls. Impact: Successful exploitation of this vulnerability may affect availability.