Permission control vulnerability in contacts. Impact: Successful exploitation of this vulnerability may affect availability.