Vulnerabilites related to whatsapp - whatsapp
Vulnerability from fkie_nvd
Published
2017-05-18 06:29
Modified
2025-04-20 01:37
Severity ?
Summary
Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who expect file deletion to occur upon chat deletion, or who expect encryption (consistent with the application's use of an encrypted database to store chat text). NOTE: the vendor reportedly indicates that they do not "consider these to be security issues" because a user may legitimately want to preserve any file for use "in other apps like the Google Photos gallery" regardless of whether its associated chat is deleted
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/100906 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/ | Exploit, Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100906 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/ | Exploit, Mitigation, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "AB847AD9-8EE1-46FC-A7BB-24A90561101E", "versionEndExcluding": "2.16.323", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who expect file deletion to occur upon chat deletion, or who expect encryption (consistent with the application\u0027s use of an encrypted database to store chat text). NOTE: the vendor reportedly indicates that they do not \"consider these to be security issues\" because a user may legitimately want to preserve any file for use \"in other apps like the Google Photos gallery\" regardless of whether its associated chat is deleted" }, { "lang": "es", "value": "** EN DISPUTA ** Facebook WhatsApp Messenger 2.17.146 para Android utiliza la tarjeta SD para el almacenamiento en archivos en texto claro (audio, documentos, im\u00e1genes, v\u00eddeos y notas de voz) asociados a una conversaci\u00f3n incluso si se elimina dicha conversaci\u00f3n. Puede haber usuarios que esperen que se realice el borrado de estos archivos una vez que se elimina la conversaci\u00f3n o usuarios que esperen que estos archivos est\u00e9n cifrados (de acuerdo al uso por parte de la aplicaci\u00f3n de una base de datos cifrada para almacenar los textos de conversaciones). NOTA: el fabricante indica que no \\\"considera que esto se trate de problemas de seguridad\\\" debido a que un usuario, de forma leg\u00edtima, puede querer preservar cualquier archivo para su uso \\\"en otras apps como la galer\u00eda de Google Photos\\\", independientemente de si la conversaci\u00f3n asociada se ha eliminado o no." } ], "id": "CVE-2017-8769", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-05-18T06:29:00.340", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100906" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/100906" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-311" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-14 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | http://www.securityfocus.com/bid/108804 | Third Party Advisory, VDB Entry | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2018-6349/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108804 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2018-6349/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "252DC649-9C0C-4896-97B7-7BD3D03DA54D", "versionEndExcluding": "2.18.132", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "A7390EAF-A04C-48B2-98F4-D82D9BC422C5", "versionEndExcluding": "2.18.248", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132." }, { "lang": "es", "value": "Al recibir llamadas usando WhatsApp para Android, una falta de comprobaci\u00f3n de tama\u00f1o cuando se analizan un paquete proporcionado por el remitente permite un desbordamiento basado en la pila. Este problema afecta a WhatsApp para Android anterior a versi\u00f3n 2.18.248 y WhatsApp Business para Android anterior a versi\u00f3n 2.18.132." } ], "id": "CVE-2018-6349", "lastModified": "2024-11-21T04:10:32.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-14T17:29:02.127", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108804" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6349/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6349/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-03 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "94A5904E-1921-4B50-93DD-1D82CBC1DF9B", "versionEndExcluding": "2.20.111", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "1B569A24-2305-4924-9AB7-2EB6F1B27685", "versionEndExcluding": "2.20.111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold." }, { "lang": "es", "value": "Un uso de la memoria previamente liberada en una biblioteca de registro en WhatsApp para iOS anterior a versi\u00f3n v2.20.111 y WhatsApp Business para iOS anterior a versi\u00f3n v2.20.111, podr\u00eda haber resultado en una corrupci\u00f3n de la memoria, fallos y potencialmente una ejecuci\u00f3n de c\u00f3digo.\u0026#xa0;Esto podr\u00eda haber sucedido solo si varios eventos ocurrieron juntos en secuencia, incluyendo la recepci\u00f3n de una pegatina animada mientras se coloca una videollamada de WhatsApp en espera" } ], "id": "CVE-2020-1909", "lastModified": "2024-11-21T05:11:35.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-03T20:15:12.470", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-416" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-03 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
* | |||
whatsapp_business | * | ||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "8E0D3451-852D-4A69-876D-CF84C5D3EECB", "versionEndExcluding": "2.20.30", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "73B69D25-61DE-4B60-8E5F-942150050FE7", "versionEndExcluding": "2.20.35", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "D2B1D57D-4AF1-4405-A321-BF9A4B78C650", "versionEndExcluding": "2.20.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "85034E27-0EFC-4B02-BD1C-ED77E3F4529E", "versionEndExcluding": "2.20.30", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message." }, { "lang": "es", "value": "Un desbordamiento de escritura de pila en WhatsApp para Android versiones anteriores a v2.20.35, WhatsApp Business para Android versiones anteriores a v2.20.20, WhatsApp para iPhone versiones anteriores a v2.20.30 y WhatsApp Business para iPhone versiones anteriores a v2.20.30, podr\u00eda haber permitido una ejecuci\u00f3n de c\u00f3digo arbitraria cuando se reproduce un mensaje push to talk especialmente dise\u00f1ado" } ], "id": "CVE-2020-1894", "lastModified": "2024-11-21T05:11:33.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-03T21:15:10.813", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "CA96B32C-5673-4B36-AE2C-D318744B0E25", "versionEndIncluding": "2.20.140", "versionStartIncluding": "2.20.108", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "D098DF3C-6EA3-470E-865C-601827ABFB35", "versionEndIncluding": "2.20.49", "versionStartIncluding": "2.20.35", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP." }, { "lang": "es", "value": "Un usuario que realiza una b\u00fasqueda r\u00e1pida en un mensaje altamente reenviado en WhatsApp para Android desde versiones v2.20.108 hasta v2.20.140 o WhatsApp Business para Android desde versiones v2.20.35 hasta v2.20.49, podr\u00eda haber sido enviado al servicio de Google por medio de un HTTP plano" } ], "id": "CVE-2020-1902", "lastModified": "2024-11-21T05:11:34.770", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:15.627", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-14 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2018-6339/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2018-6339/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "7111B367-98BD-4244-A3F5-661A1DCE43C3", "versionEndExcluding": "2.18.150", "versionStartIncluding": "2.18.103", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "6AF2CF4A-DE98-48CC-A13A-E168EA4678E6", "versionEndExcluding": "2.18.295", "versionStartIncluding": "2.18.180", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150." }, { "lang": "es", "value": "Cuando se reciben llamadas con WhatsApp en Android, en la asignaci\u00f3n de pila no se considera adecuadamente la cantidad de datos que est\u00e1n pasando. Un error de uno en uno significaba que los datos se escrib\u00edan fuera del espacio asignado en la pila. Este problema afecta a WhatsApp para Android a partir de la versi\u00f3n 2.18.180 y se corrigi\u00f3 en la versi\u00f3n 2.18.295. Tambi\u00e9n afecta a WhatsApp Business para Android a partir de la versi\u00f3n v2.18.103 y se corrigi\u00f3 en la versi\u00f3n v2.18.150." } ], "id": "CVE-2018-6339", "lastModified": "2024-11-21T04:10:30.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-14T17:29:02.003", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6339/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6339/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-14 20:29
Modified
2025-03-21 19:35
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | http://www.securityfocus.com/bid/108329 | Broken Link, Third Party Advisory, VDB Entry | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-3568 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108329 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-3568 | Third Party Advisory |
Impacted products
{ "cisaActionDue": "2022-05-10", "cisaExploitAdd": "2022-04-19", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "WhatsApp VOIP Stack Buffer Overflow Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:tizen:*:*", "matchCriteriaId": "49A0C7E5-1C25-4EA2-9436-A7922ACACB9B", "versionEndExcluding": "2.18.15", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows_phone:*:*", "matchCriteriaId": "449816D3-570F-47D7-A70D-9351A4A6F190", "versionEndExcluding": "2.18.348", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "40408328-5F07-4AF3-A7A5-231D6EB05E9F", "versionEndExcluding": "2.19.44", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "84F1BA88-BA43-4857-B4C2-A32FA2937C11", "versionEndExcluding": "2.19.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:*:*", "matchCriteriaId": "5C0EFE9B-7E98-40D7-A7CF-789F9E96F876", "versionEndExcluding": "2.19.51", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "B36B6FF7-DC69-4A5C-9FE7-EB127E6D0AA1", "versionEndExcluding": "2.19.134", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." }, { "lang": "es", "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en la pila VOIP de WhatsApp permiti\u00f3 la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de una serie de paquetes RTCP especialmente dise\u00f1ados que se enviaron a un n\u00famero de tel\u00e9fono de destino. El problema afecta a WhatsApp para Android anterior a v2.19.134, WhatsApp Business para Android anterior a v2.19.44, WhatsApp para iOS anterior a v2.19.51, WhatsApp Business para iOS anterior a v2.19.51, WhatsApp para Windows Phone antes de v2.18.348 , y WhatsApp para Tizen antes de v2.18.15." } ], "id": "CVE-2019-3568", "lastModified": "2025-03-21T19:35:08.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2019-05-14T20:29:03.187", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108329" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3568" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-03 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "33848028-11CA-40B5-832C-DC774B5F22A3", "versionEndExcluding": "2.20.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "AF71CD40-98B0-42B6-8F4B-9E18259A0171", "versionEndExcluding": "2.20.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction." }, { "lang": "es", "value": "Un problema de comprobaci\u00f3n de URL en WhatsApp para Android versiones anteriores a v2.20.11 y WhatsApp Business para Android versiones anteriores a v2.20.2, podr\u00eda haber causado que el destinatario de un mensaje sticker que conten\u00eda datos deliberadamente malformados cargara una imagen desde una URL controlada por el remitente sin interacci\u00f3n del usuario" } ], "id": "CVE-2020-1890", "lastModified": "2024-11-21T05:11:33.283", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-03T21:15:10.643", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-01-21 21:15
Modified
2025-03-21 19:40
Severity ?
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
8.2 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
Summary
A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-18426 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-18426 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_for_desktop | * |
{ "cisaActionDue": "2022-06-13", "cisaExploitAdd": "2022-05-23", "cisaRequiredAction": "Apply updates per vendor instructions.", "cisaVulnerabilityName": "WhatsApp Cross-Site Scripting Vulnerability", "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "2D9DA8A2-5225-4E0D-A8DF-1E1E9404263C", "versionEndExcluding": "2.20.10", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_for_desktop:*:*:*:*:*:-:*:*", "matchCriteriaId": "41105557-48D5-4497-8F77-9DFC53E88B17", "versionEndExcluding": "0.3.9309", "vulnerable": true } ], "negate": false, "operator": "AND" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message." }, { "lang": "es", "value": "Una vulnerabilidad en WhatsApp Desktop versiones anteriores a 0.3.9309, cuando se combina con WhatsApp para iPhone versiones anteriores a 2.20.10, permite ataques de tipo cross-site scripting y la lectura de archivos locales. Explotar la vulnerabilidad requiere que la v\u00edctima haga clic en la vista previa de un enlace de mensaje de texto especialmente dise\u00f1ado." } ], "id": "CVE-2019-18426", "lastModified": "2025-03-21T19:40:58.553", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2020-01-21T21:15:16.147", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html" }, { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-18426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-18426" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
* | |||
* | |||
whatsapp_business | * | ||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "E27F4563-ACF1-44D8-BC87-477D935B8F99", "versionEndExcluding": "2.20.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "52C884A6-89FA-47EE-BC8E-C15BE7A6C125", "versionEndExcluding": "2.20.196.16", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:portal:*:*", "matchCriteriaId": "E0CC3EA5-3726-4B82-8BD6-F49C3B1707E5", "versionEndExcluding": "173.0.0.29.505", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "ACB71228-9A27-43B1-A54A-98A6ED1316C1", "versionEndExcluding": "2.20.90", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "1D6120AE-331E-43D5-A8F3-0656AC0C2184", "versionEndExcluding": "2.20.196.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header." }, { "lang": "es", "value": "Un desbordamiento de pila en WhatsApp para Android anterior a versi\u00f3n v2.20.196.16, WhatsApp Business para Android anterior a versi\u00f3n v2.20.196.12, WhatsApp para iOS anterior a versi\u00f3n v2.20.90, WhatsApp Business para iOS anterior a versi\u00f3n v2.20.90 y WhatsApp para Portal anterior a versi\u00f3n v173.0.0.29.505, podr\u00eda haber permitido una ejecuci\u00f3n de c\u00f3digo arbitrario cuando analiza el contenido de un encabezado RTP Extension" } ], "id": "CVE-2020-1907", "lastModified": "2024-11-21T05:11:35.333", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:17.187", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-11 04:15
Modified
2024-11-21 05:52
Severity ?
Summary
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:-:android:*:*", "matchCriteriaId": "10695AFD-3693-4566-A016-BE769BA53E5D", "versionEndExcluding": "2.21.8.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "96064543-9166-44E7-967F-C272DAE98293", "versionEndExcluding": "2.21.8.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files." }, { "lang": "es", "value": "Una falta de comprobaci\u00f3n de los nombres de archivo al descomprimir archivos anterior a versi\u00f3n de WhatsApp para Android versi\u00f3n v2.21.8.13 y WhatsApp Business para Android versi\u00f3n v2.21.8.13, podr\u00eda haber permitido ataques de salto de rutas que sobrescribieran los archivos de WhatsApp" } ], "id": "CVE-2021-24035", "lastModified": "2024-11-21T05:52:15.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T04:15:08.887", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver's WhatsApp contacts.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "51FFA80F-58E2-4EBB-9815-6DFCFABE6F6A", "versionEndExcluding": "2.20.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "73A2E8EB-9428-48E6-AB28-3B3A3FD838EF", "versionEndExcluding": "2.20.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver\u0027s WhatsApp contacts." }, { "lang": "es", "value": "Un problema al descomprimir documentos docx, pptx y xlsx en WhatsApp para iOS anterior a versi\u00f3n v2.20.61 y WhatsApp Business para iOS anterior a versi\u00f3n v2.20.61, podr\u00eda haber resultado en una denegaci\u00f3n de servicio por falta de memoria.\u0026#xa0;Este problema habr\u00eda requerido que el receptor abriera expl\u00edcitamente el archivo adjunto si se recibi\u00f3 de un n\u00famero que no estaba en los contactos de WhatsApp del receptor" } ], "id": "CVE-2020-1903", "lastModified": "2024-11-21T05:11:34.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:15.907", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-09-27 21:15
Modified
2024-11-21 04:21
Severity ?
Summary
An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-11927 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-11927 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "51F426B0-4A86-4A70-AA2D-5AAE2639E37F", "versionEndExcluding": "2.9.143", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "D2B2A95F-2B7C-4083-93DE-5925E2F99E4B", "versionEndExcluding": "2.19.100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100." }, { "lang": "es", "value": "Un desbordamiento de enteros en las bibliotecas de an\u00e1lisis multimedia de WhatsApp permite a un atacante remoto llevar a cabo una escritura fuera de l\u00edmite en el pila por medio de etiquetas EXIF especialmente dise\u00f1adas en im\u00e1genes WEBP. Este problema afecta a WhatsApp para Android anterior a la versi\u00f3n 2.19.143 y WhatsApp para iOS anterior a la versi\u00f3n 2.19.100." } ], "id": "CVE-2019-11927", "lastModified": "2024-11-21T04:21:59.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-27T21:15:09.737", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11927" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-14 17:29
Modified
2024-11-21 04:01
Severity ?
Summary
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | http://www.securityfocus.com/bid/108805 | Third Party Advisory, VDB Entry | |
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2018-20655/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/108805 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2018-20655/ | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "33D5A648-8238-4037-8276-00CB8FA95E80", "versionEndExcluding": "2.18.90.24", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:*:*", "matchCriteriaId": "39C8C465-1ADF-4E6E-A3B5-E85954BE28A5", "versionEndExcluding": "2.18.90.24", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24." }, { "lang": "es", "value": "Cuando se reciben llamadas con WhatsApp para iOS, una falta de comprobaci\u00f3n de tama\u00f1o al analizar un paquete proporcionado por el remitente permite un desbordamiento basado en la pila. Este problema afecta a WhatsApp para iOS anterior a versi\u00f3n v2.18.90.24 y WhatsApp Business para iOS anterior a versi\u00f3n v2.18.90.24." } ], "id": "CVE-2018-20655", "lastModified": "2024-11-21T04:01:56.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-14T17:29:01.050", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108805" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-20655/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/108805" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-20655/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-03 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "33848028-11CA-40B5-832C-DC774B5F22A3", "versionEndExcluding": "2.20.11", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "AF71CD40-98B0-42B6-8F4B-9E18259A0171", "versionEndExcluding": "2.20.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call." }, { "lang": "es", "value": "Un desbordamiento del b\u00fafer en WhatsApp para Android versiones anteriores a v2.20.11 y WhatsApp Business para Android versiones anteriores a v2.20.2, podr\u00eda haber permitido una escritura fuera de l\u00edmites por medio de una transmisi\u00f3n de video especialmente dise\u00f1ada despu\u00e9s de recibir y responder una videollamada maliciosa" } ], "id": "CVE-2020-1886", "lastModified": "2024-11-21T05:11:32.773", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-03T21:15:10.517", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" }, { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "FFC43EA6-289B-43DF-BC4A-7F0119F3ED55", "versionEndExcluding": "2.20.185", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated." }, { "lang": "es", "value": "Los URI de Media ContentProvider usados para abrir archivos adjuntos en otras aplicaciones se generaron secuencialmente antes de WhatsApp para Android versi\u00f3n v2.20.185, lo que podr\u00eda haber permitido que una aplicaci\u00f3n de terceros maliciosa elegida para abrir el archivo adivine los URI de los archivos adjuntos abiertos previamente hasta que la aplicaci\u00f3n de apertura sea finalizada" } ], "id": "CVE-2020-1905", "lastModified": "2024-11-21T05:11:35.110", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:16.580", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-340" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-04 20:15
Modified
2024-11-21 08:13
Severity ?
5.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
5.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
5.6 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Summary
A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2023/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2023/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:mac_os_x:*:*", "matchCriteriaId": "7C6CEBF5-6C77-4B03-8964-203FA2416CC7", "versionEndExcluding": "2.2338.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability." }, { "lang": "es", "value": "Una condici\u00f3n de ejecuci\u00f3n en un subsistema de transporte de red provoc\u00f3 un problema de use-after-free en llamadas de audio/video entrantes establecidas o no silenciadas que podr\u00edan haber resultado en la terminaci\u00f3n de la aplicaci\u00f3n o en un flujo de control inesperado con muy baja probabilidad." } ], "id": "CVE-2023-38537", "lastModified": "2024-11-21T08:13:47.330", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "cve-assign@fb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-04T20:15:09.927", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2023/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-06 17:15
Modified
2024-11-21 05:52
Severity ?
Summary
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
* | |||
whatsapp_business | * | ||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "A2F90DE0-CAA1-417A-9D8A-279C966CF126", "versionEndExcluding": "2.21.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "63C685C5-9E36-456E-8627-F7789BF9A817", "versionEndExcluding": "2.21.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "8C00EB21-B107-4D99-9D1E-09B0FA443F3F", "versionEndExcluding": "2.21.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "735449C3-06DF-4F11-B821-5DDB5F2BC2F1", "versionEndExcluding": "2.21.32", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write." }, { "lang": "es", "value": "Una falta de comprobaci\u00f3n de l\u00edmites dentro de la tuber\u00eda de decodificaci\u00f3n de audio para llamadas de WhatsApp en WhatsApp para Android versiones anteriores a v2.21.3, WhatsApp Business para Android versiones anteriores a v2.21.3, WhatsApp para iOS versiones anteriores a v2.21.32 y WhatsApp Business para iOS versiones anteriores a v2. 21.32, podr\u00eda haber permitido una escritura fuera de l\u00edmites" } ], "id": "CVE-2021-24026", "lastModified": "2024-11-21T05:52:14.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-06T17:15:12.870", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-03 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "530735AF-E014-4218-9EAD-39FC0EDC9B46", "versionEndExcluding": "2.20.100", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "F7A546C8-BFFF-438D-8201-F68F1AD15389", "versionEndExcluding": "2.20.100", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked." }, { "lang": "es", "value": "La autorizaci\u00f3n inapropiada de la funcionalidad Screen Lock en WhatsApp y WhatsApp Business para iOS anterior a versi\u00f3n v2.20.100, podr\u00eda haber permitido el uso de Siri para interactuar con la aplicaci\u00f3n WhatsApp inclusive despu\u00e9s de que el tel\u00e9fono estuviera bloqueado" } ], "id": "CVE-2020-1908", "lastModified": "2024-11-21T05:11:35.460", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-03T20:15:12.330", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-285" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-552" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-06-14 17:29
Modified
2024-11-21 04:10
Severity ?
Summary
An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "139F635A-0B95-4E79-BE42-1EF2CE5A8F40", "versionEndExcluding": "2.18.99", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:*:*", "matchCriteriaId": "F1B47F84-5362-4C2D-917B-E46580242858", "versionEndExcluding": "2.18.100.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "441C5C11-D968-4BC4-ADA8-E16B5174B8DB", "versionEndExcluding": "2.18.100.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows_phone:*:*", "matchCriteriaId": "CF68727A-1D7F-4A59-A35B-B4D1B3F5929F", "versionEndExcluding": "2.18.224", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "F9A5B45E-FA04-498E-A169-C016937F8E2F", "versionEndExcluding": "2.18.276", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224." }, { "lang": "es", "value": "Fue posible una lectura fuera de l\u00edmites en WhatsApp debido a un an\u00e1lisis incorrecto de los encabezados de extensi\u00f3n RTP. Este problema afecta a WhatsApp para Android anterior a versi\u00f3n 2.18.276, WhatsApp Business para Android anterior a versi\u00f3n 2.18.99, WhatsApp para iOS anterior a versi\u00f3n 2.18.100.6, WhatsApp Business para iOS anterior a versi\u00f3n 2.18.100.2 y WhatsApp para Windows Phone anterior a versi\u00f3n 2.18. 224." } ], "id": "CVE-2018-6350", "lastModified": "2024-11-21T04:10:32.150", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-14T17:29:02.283", "references": [ { "source": "cve-assign@fb.com", "url": "http://www.securityfocus.com/bid/108803" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6350/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/108803" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6350/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-23 16:15
Modified
2024-11-21 04:22
Severity ?
Summary
A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-11933 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-11933 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
libpl_droidsonroids_gif_project | libpl_droidsonroids_gif | * | |
* |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libpl_droidsonroids_gif_project:libpl_droidsonroids_gif:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FEE179-FDE8-4CCA-8F6F-0907B4277570", "versionEndExcluding": "1.2.19", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "50B294F8-D29C-4BE6-9C6B-1858D1FA56AE", "versionEndExcluding": "2.19.291", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service." }, { "lang": "es", "value": "Un error de desbordamiento del b\u00fafer de la pila en libpl_droidsonroids_gif antes del 1.2.19, como es usado en WhatsApp para Android anteriores a la versi\u00f3n 2.19.291, podr\u00eda permitir a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio." } ], "id": "CVE-2019-11933", "lastModified": "2024-11-21T04:22:00.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-23T16:15:11.730", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11933" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11933" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "B46F8D8E-BE9C-4527-B506-B72D6D143B3A", "versionEndExcluding": "2.20.91.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message." }, { "lang": "es", "value": "Al recibir un mensaje de texto grande que contiene una URL en WhatsApp para iOS anterior a versi\u00f3n v2.20.91.4, podr\u00eda haber causado que la aplicaci\u00f3n se congelara mientras se procesaba el mensaje" } ], "id": "CVE-2020-1901", "lastModified": "2024-11-21T05:11:34.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:15.267", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-04-06 17:15
Modified
2024-11-21 05:52
Severity ?
Summary
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "5F9D91CC-43EE-4F76-ACE5-8DA2DAAA9012", "versionEndExcluding": "2.21.4.18", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "9F814EFA-6C24-47CA-9180-7047B92717D2", "versionEndExcluding": "2.21.4.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device\u2019s external storage to read cached TLS material." }, { "lang": "es", "value": "Un problema de configuraci\u00f3n de cach\u00e9 anterior a WhatsApp para Android versi\u00f3n v2.21.4.18 y WhatsApp Business para Android versi\u00f3n v2.21.4.18, puede haber permitido a un tercero con acceso al almacenamiento externo del dispositivo leer material TLS almacenado en cach\u00e9" } ], "id": "CVE-2021-24027", "lastModified": "2024-11-21T05:52:14.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-06T17:15:12.977", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-524" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "CA9B5336-F9F5-48D4-B49A-64054A2DC30D", "versionEndExcluding": "2.20.130", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "BF8D5621-155A-427E-82BA-61879B45B5C2", "versionEndExcluding": "2.20.46", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams." }, { "lang": "es", "value": "Un desbordamiento de b\u00fafer en WhatsApp para Android anterior a versi\u00f3n v2.20.130 y WhatsApp Business para Android anterior a versi\u00f3n v2.20.46, podr\u00eda haber permitido una escritura fuera de l\u00edmites al procesar videos locales malformados con transmisiones de audio E-AC-3" } ], "id": "CVE-2020-1906", "lastModified": "2024-11-21T05:11:35.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:16.907", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-07 19:15
Modified
2024-11-21 05:52
Severity ?
Summary
A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "B86CA66D-98E9-431A-A397-45332A71C06E", "versionEndExcluding": "2.21.22.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "18DAE9BF-DACB-4EFE-90AC-53AB127877FD", "versionEndExcluding": "2.21.22.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image." }, { "lang": "es", "value": "Una comprobaci\u00f3n de l\u00edmites faltante en el c\u00f3digo de desenfoque de im\u00e1genes anterior a WhatsApp para Android v2.21.22.7 y WhatsApp Business para Android v2.21.22.7 podr\u00eda haber permitido una escritura fuera de l\u00edmites si un usuario enviaba una imagen maliciosa" } ], "id": "CVE-2021-24041", "lastModified": "2024-11-21T05:52:15.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-07T19:15:07.430", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-09-03 21:15
Modified
2024-11-21 05:11
Severity ?
Summary
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
* | |||
whatsapp_business | * | ||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "A2AC5DBD-EE20-4FD4-B167-DB51C4FF9947", "versionEndExcluding": "2.20.17", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "F4849283-286E-4EB3-8E6D-62BD337F6B80", "versionEndExcluding": "2.20.20", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "159204F0-81C6-46B4-A5D9-61F9658F93F3", "versionEndExcluding": "2.20.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "71FD0B05-6C75-4A4B-ACF9-CD6A0B2437DE", "versionEndExcluding": "2.20.20", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices." }, { "lang": "es", "value": "Un par\u00e1metro controlado por usuario usado en videollamada en WhatsApp para Android versiones anteriores a v2.20.17, WhatsApp Business para Android versiones anteriores a v2.20.7, WhatsApp para iPhone versiones anteriores a v2.20.20 y WhatsApp Business para iPhone versiones anteriores a v2.20.20, podr\u00eda haber permitido una escritura fuera de l\u00edmites en dispositivos de 32 bits" } ], "id": "CVE-2020-1891", "lastModified": "2024-11-21T05:11:33.403", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-09-03T21:15:10.750", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-04 19:15
Modified
2025-05-22 19:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Not Applicable, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Not Applicable, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:-:*", "matchCriteriaId": "A752CDB2-ECDB-4076-95B9-3793D8DF4D80", "versionEndExcluding": "2.21.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "39074B84-158A-4E9F-8055-D3F902E382F6", "versionEndExcluding": "2.21.23", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:-:*", "matchCriteriaId": "6192798B-5793-4647-8C5F-35CC44E241E6", "versionEndExcluding": "2.21.230", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:-:*", "matchCriteriaId": "31048698-360B-4C1F-AE74-86846F457EC2", "versionEndExcluding": "2.21.230", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:kaios:*:*", "matchCriteriaId": "4FAD2D47-D8C2-4EA1-A681-4C9AB873DF96", "versionEndExcluding": "2.2143", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:-:*:*", "matchCriteriaId": "16927F06-8389-449B-B662-50A2ED30A3DA", "versionEndExcluding": "2.2146", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor." }, { "lang": "es", "value": "La l\u00f3gica de llamada de WhatsApp para Android versiones anteriores a 2.21.23, WhatsApp Business para Android versiones anteriores a 2.21.23, WhatsApp para iOS versiones anteriores a 2.21.230, WhatsApp Business para iOS versiones anteriores a 2.21.230, WhatsApp para KaiOS versiones anteriores a 2.2143, WhatsApp Desktop versiones anteriores a 2.2146, podr\u00eda haber permitido una escritura fuera de l\u00edmites si un usuario realiza una llamada 1:1 a un actor malicioso" } ], "id": "CVE-2021-24042", "lastModified": "2025-05-22T19:15:23.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-01-04T19:15:14.603", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-16 21:15
Modified
2024-11-21 04:42
Severity ?
Summary
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-3571 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-3571 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:mac_os_x:*:*", "matchCriteriaId": "30C9ACE4-E5CF-445F-8623-A243A2AD0E9D", "versionEndExcluding": "0.3.3793", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:windows:*:*", "matchCriteriaId": "EE475C30-0F28-404B-B353-01B53BBFDDFC", "versionEndExcluding": "0.3.3793", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension." }, { "lang": "es", "value": "Un problema de comprobaci\u00f3n de entrada afect\u00f3 a WhatsApp Desktop versiones anteriores a 0.3.3793, lo que permite a los clientes maliciosos enviar archivos a usuarios que se desplegar\u00edan con una extensi\u00f3n incorrecta." } ], "id": "CVE-2019-3571", "lastModified": "2024-11-21T04:42:11.300", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-16T21:15:11.677", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3571" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-116" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-05 12:15
Modified
2025-04-09 18:15
Severity ?
Summary
A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*", "matchCriteriaId": "2A3F57F6-8A7D-4EF5-9473-A36DF09278D0", "versionEndExcluding": "2.2450.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment\u2019s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild." }, { "lang": "es", "value": "Un problema de suplantaci\u00f3n de identidad en WhatsApp para Windows anterior a la versi\u00f3n 2.2450.6 mostraba los archivos adjuntos seg\u00fan su tipo MIME, pero seleccionaba el controlador de apertura seg\u00fan la extensi\u00f3n del archivo. Una discrepancia maliciosa podr\u00eda haber provocado que el destinatario ejecutara c\u00f3digo arbitrario sin darse cuenta en lugar de ver el archivo adjunto al abrirlo manualmente en WhatsApp." } ], "id": "CVE-2025-30401", "lastModified": "2025-04-09T18:15:45.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-04-05T12:15:14.540", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2025-30401" }, { "source": "cve-assign@fb.com", "url": "https://www.whatsapp.com/security/advisories/2025/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-04 20:15
Modified
2024-11-21 08:13
Severity ?
5.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
5.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
5.0 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Summary
A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2023/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2023/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:desktop:windows:*:*", "matchCriteriaId": "59B97470-3259-479B-A43F-13FAD03299F6", "versionEndExcluding": "2.2320.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability." }, { "lang": "es", "value": "Una condici\u00f3n de ejecuci\u00f3n en un subsistema de eventos provoc\u00f3 un problema de use-after-free en llamadas de audio/video establecidas que podr\u00eda haber resultado en la terminaci\u00f3n de la aplicaci\u00f3n o en un flujo de control inesperado con muy baja probabilidad." } ], "id": "CVE-2023-38538", "lastModified": "2024-11-21T08:13:47.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.4, "source": "cve-assign@fb.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-10-04T20:15:10.020", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2023/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-10-03 22:15
Modified
2024-11-21 04:22
Severity ?
Summary
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
android-gif-drawable_project | android-gif-drawable | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "79053D5E-A5AF-4D1E-ACEF-0A1F18319A3C", "versionEndExcluding": "2.19.244", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:android-gif-drawable_project:android-gif-drawable:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F5FD855-584B-4F02-B9DE-937C4D92C297", "versionEndExcluding": "1.2.18", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image." }, { "lang": "es", "value": "Una vulnerabilidad doble gratuita en la funci\u00f3n DDGifSlurp en decoding.c en la biblioteca android-gif-drawable antes de la versi\u00f3n 1.2.18, como se usa en WhatsApp para Android antes de la versi\u00f3n 2.19.244 y muchas otras aplicaciones de Android, permite a los atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio cuando la biblioteca se utiliza para analizar una imagen GIF especialmente dise\u00f1ada." } ], "id": "CVE-2019-11932", "lastModified": "2024-11-21T04:22:00.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-10-03T22:15:10.370", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html" }, { "source": "cve-assign@fb.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Nov/27" }, { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263" }, { "source": "cve-assign@fb.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9" }, { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11932" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2019/Nov/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11932" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-415" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-10-06 18:15
Modified
2024-11-21 05:11
Severity ?
Summary
A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlsx, and pptx files as attachments to messages.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "51FFA80F-58E2-4EBB-9815-6DFCFABE6F6A", "versionEndExcluding": "2.20.61", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "73A2E8EB-9428-48E6-AB28-3B3A3FD838EF", "versionEndExcluding": "2.20.61", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlsx, and pptx files as attachments to messages." }, { "lang": "es", "value": "Un problema de validaci\u00f3n de rutas en WhatsApp para iOS anterior a la v2.20.61 y en WhatsApp Business para iOS anterior a la v2.20.61 podr\u00eda haber permitido atravesar directorios sobrescribiendo archivos al enviar archivos docx, xlsx y pptx especialmente dise\u00f1ados como adjuntos a los mensajes" } ], "id": "CVE-2020-1904", "lastModified": "2024-11-21T05:11:34.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-10-06T18:15:16.203", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-23" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-05-10 21:29
Modified
2024-11-21 04:42
Severity ?
Summary
A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-3566 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-3566 | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "F990E9CA-6D62-4804-8E0C-DAC9AD7DA3DE", "versionEndIncluding": "2.19.103", "versionStartIncluding": "2.19.54", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.19.52:*:*:*:*:android:*:*", "matchCriteriaId": "C3AF6D26-D194-4F97-90A6-3A84ACFE6E20", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "D86A653D-F50C-409D-82C9-2342EEFB0F29", "versionEndIncluding": "2.19.38", "versionStartIncluding": "2.19.22", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug in WhatsApp for Android\u0027s messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user\u0027s account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38." }, { "lang": "es", "value": "Se descubri\u00f3 un error en la l\u00f3gica de mensajer\u00eda de WhatsApp para Android que permitir\u00eda potencialmente que un individuo malicioso que se haya encargado de la cuenta de un usuario de WhatsApp recupere los mensajes enviados anteriormente. Este comportamiento requiere un conocimiento independiente de los metadatos para los mensajes anteriores, que no est\u00e1n disponibles p\u00fablicamente. Este problema afecta a WhatsApp para Android versi\u00f3n 2.19.52 y versi\u00f3n 2.19.54 - 2.19.103, as\u00ed como a WhatsApp Business para Android comenzando en la versi\u00f3n v2.19.22 hasta v2.19.38." } ], "id": "CVE-2019-3566", "lastModified": "2024-11-21T04:42:10.717", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-05-10T21:29:00.303", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3566" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-22 22:15
Modified
2025-05-27 16:15
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
An integer overflow in WhatsApp could result in remote code execution in an established video call.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:-:android:*:*", "matchCriteriaId": "039958FD-E011-4F9C-AD30-5BF85819C8CC", "versionEndExcluding": "2.22.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:-:iphone_os:*:*", "matchCriteriaId": "BE8C49E2-B47D-4B1D-B76E-EE817BDA698A", "versionEndExcluding": "2.22.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*", "matchCriteriaId": "2E639A40-0CC4-45DA-8D69-F16EF733A66A", "versionEndExcluding": "2.22.16.12", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:*:*", "matchCriteriaId": "01AED071-0A7F-4E56-B1EE-D8E0D4F94249", "versionEndExcluding": "2.22.16.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer overflow in WhatsApp could result in remote code execution in an established video call." }, { "lang": "es", "value": "Un desbordamiento de enteros en WhatsApp podr\u00eda dar resultar en una ejecuci\u00f3n de c\u00f3digo remota en una videollamada establecida" } ], "id": "CVE-2022-36934", "lastModified": "2025-05-27T16:15:27.070", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-22T22:15:09.627", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2022/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-190" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-03-23 22:15
Modified
2024-11-21 05:11
Severity ?
Summary
Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | https://github.com/zadewg/RIUS | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/zadewg/RIUS | Exploit, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "DCBE170B-3223-4B92-9887-FB4A653032E4", "versionEndIncluding": "2.19.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "286A04B0-C755-46D0-ABE2-5A57D50A9239", "versionEndIncluding": "2.19.222", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages." }, { "lang": "es", "value": "Whatsapp iOS 2.19.80 y anteriores y Android 2.19.222 y versiones anteriores de interfaz de usuario, no representa apropiadamente los mensajes URI al usuario, lo que resulta en una suplantaci\u00f3n de URI por medio de mensajes especialmente dise\u00f1ados" } ], "id": "CVE-2020-20096", "lastModified": "2024-11-21T05:11:50.540", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-03-23T22:15:12.807", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zadewg/RIUS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/zadewg/RIUS" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-02 12:15
Modified
2024-11-21 05:52
Severity ?
Summary
A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Not Applicable, Vendor Advisory | |
nvd@nist.gov | https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Not Applicable, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
2.21.23.2 | |||
2.21.230.6 | |||
2.2145.0 | |||
whatsapp_business | 2.21.23.2 | ||
whatsapp_business | 2.21.230.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.21.23.2:*:*:*:*:android:*:*", "matchCriteriaId": "E2C25B9E-58CC-4252-BD71-5BE434424C25", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.21.230.6:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "A008CAA3-8937-4AB2-8A94-D31CFD982BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:2.2145.0:*:*:*:desktop:*:*:*", "matchCriteriaId": "FCD713BE-B324-4668-B4EC-6967987DD89C", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:2.21.23.2:*:*:*:*:android:*:*", "matchCriteriaId": "54C89209-4539-4E2C-A4C3-C88489CD3D51", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:2.21.230.7:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "C5B4676D-A585-4F23-805B-A5CC995A498B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call." }, { "lang": "es", "value": "Una comprobaci\u00f3n de l\u00edmites ausente en el c\u00f3digo de an\u00e1lisis de banderas RTCP anterior a WhatsApp para Android versi\u00f3n v2.21.23.2, WhatsApp Business para Android versi\u00f3n v2.21.23.2, WhatsApp para iOS versi\u00f3n v2.21.230.6, WhatsApp Business para iOS versi\u00f3n 2.21.230.7 y WhatsApp Desktop versi\u00f3n v2.2145.0, podr\u00eda haber permitido una lectura de pila fuera de l\u00edmites si un usuario enviaba un paquete RTCP malformado durante una llamada establecida" } ], "id": "CVE-2021-24043", "lastModified": "2024-11-21T05:52:16.160", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-02T12:15:07.890", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "nvd@nist.gov", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2022/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-31 22:29
Modified
2025-05-06 16:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | http://www.securityfocus.com/bid/106365 | Third Party Advisory, VDB Entry | |
cve-assign@fb.com | https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106365 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html | Exploit, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "7738F86D-EA72-41C0-8AD8-2CAC59112DE4", "versionEndExcluding": "2.18.93", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows_phone:*:*", "matchCriteriaId": "56BC1EC2-A553-4DC6-BA08-F015C0436CD5", "versionEndExcluding": "2.18.172", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "95CAB3DC-7829-426A-B34A-BF6242C453BE", "versionEndExcluding": "2.18.293", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172." }, { "lang": "es", "value": "Una corrupci\u00f3n basada en memoria (heap) en WhatsApp puede deberse a un paquete RTP mal formado que se env\u00eda tras el establecimiento de una llamada. Esta vulnerabilidad puede utilizarse para provocar una denegaci\u00f3n de servicio. Afecta a WhatsApp para Android en versiones anteriores a la v2.18.293 WhatsApp para iOS en versiones anteriores a la v2.18.93 y WhatsApp for Windows Phone en versiones anteriores a la v2.18.172." } ], "id": "CVE-2018-6344", "lastModified": "2025-05-06T16:15:22.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2018-12-31T22:29:00.577", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106365" }, { "source": "cve-assign@fb.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-11-14 23:15
Modified
2024-11-21 04:22
Severity ?
Summary
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.facebook.com/security/advisories/cve-2019-11931 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.facebook.com/security/advisories/cve-2019-11931 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
* | |||
* | |||
whatsapp_business | * | ||
whatsapp_business | * | ||
whatsapp_enterprise_client | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*", "matchCriteriaId": "41BBC667-45B4-4A71-8180-7E4E94741B7D", "versionEndIncluding": "2.18.368", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "D2B2A95F-2B7C-4083-93DE-5925E2F99E4B", "versionEndExcluding": "2.19.100", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "92F3EF1F-6412-444C-8F07-972DD1A58F73", "versionEndExcluding": "2.19.274", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "DE2B7E65-8D42-45E0-8D0C-8C8B0968384B", "versionEndExcluding": "2.19.100", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "55E17510-126E-41AB-8F13-7194854D6B03", "versionEndExcluding": "2.19.104", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_enterprise_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "F028C6FB-E5F4-4BC9-9DB5-A317240804F4", "versionEndExcluding": "2.25.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100." }, { "lang": "es", "value": "Se podr\u00eda desencadenar un desbordamiento de b\u00fafer en la regi\u00f3n heap de la memoria en WhatsApp mediante el env\u00edo de un archivo MP4 especialmente dise\u00f1ado hacia un usuario de WhatsApp. El problema estaba presente en el an\u00e1lisis de los metadatos de flujo elemental de un archivo MP4 y podr\u00eda resultar en un DoS o RCE. Esto afecta a Android versiones anteriores a la versi\u00f3n 2.19.274, iOS versiones anteriores a la versi\u00f3n 2.19.100, Enterprise Client versiones anteriores a la versi\u00f3n 2.25.3, Business for Android versiones anteriores a 2.19.104 y Business for iOS versiones anteriores a 2.19.100." } ], "id": "CVE-2019-11931", "lastModified": "2024-11-21T04:22:00.433", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-14T23:15:10.443", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11931" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11931" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-121" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-23 14:15
Modified
2025-05-22 19:15
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2022/ | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "61AF00D6-F362-42C3-BC73-95842D66F1CC", "versionEndExcluding": "2.22.15.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "B77BB8D8-189C-4D97-9D82-445079D66023", "versionEndExcluding": "2.22.16.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file." }, { "lang": "es", "value": "Un desbordamiento de enteros en WhatsApp podr\u00eda haber causado una ejecuci\u00f3n de c\u00f3digo remota cuando es recibido un archivo de v\u00eddeo dise\u00f1ado." } ], "id": "CVE-2022-27492", "lastModified": "2025-05-22T19:15:29.697", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2022-09-23T14:15:12.130", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2022/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-191" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-02 20:15
Modified
2024-11-21 05:11
Severity ?
Summary
A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image.
References
▶ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.whatsapp.com/security/advisories/2021/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
* | |||
whatsapp_business | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*", "matchCriteriaId": "E9EAEDF7-0AB4-4F7F-9D0D-71CB800870A5", "versionEndExcluding": "2.21.1.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*", "matchCriteriaId": "9A046C9D-E9B5-498C-8D0A-576B5730E6F8", "versionEndExcluding": "2.21.1.13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image." }, { "lang": "es", "value": "Una falta de comprobaci\u00f3n de l\u00edmites en WhatsApp para Android anterior a la v2.21.1.13 y WhatsApp Business para Android anterior a la versi\u00f3n v2.21.1.13, podr\u00eda haber permitido la lectura y escritura fuera de l\u00edmites si un usuario aplicaba filtros de imagen espec\u00edficos a una imagen especialmente dise\u00f1ada y enviar la imagen resultante" } ], "id": "CVE-2020-1910", "lastModified": "2024-11-21T05:11:35.680", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-02T20:15:11.970", "references": [ { "source": "cve-assign@fb.com", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "sourceIdentifier": "cve-assign@fb.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "cve-assign@fb.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2019-3568 (GCVE-0-2019-3568)
Vulnerability from cvelistv5
Published
2019-05-14 19:52
Modified
2025-07-30 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.19.134 Version: unspecified < 2.19.134 |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3568" }, { "name": "108329", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108329" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-3568", "options": [ { "Exploitation": "active" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T12:56:07.366286Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-04-19", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-3568" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:03.564Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-04-19T00:00:00+00:00", "value": "CVE-2019-3568 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.134" }, { "lessThan": "2.19.134", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.44" }, { "lessThan": "2.19.134", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.51" }, { "lessThan": "2.19.51", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.51" }, { "lessThan": "2.19.51", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Windows Phone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.348" }, { "lessThan": "2.18.348", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Tizen", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.15" }, { "lessThan": "2.18.15", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-05-09T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-08-13T20:57:11.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3568" }, { "name": "108329", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108329" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-05-09", "ID": "CVE-2019-3568", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.134" }, { "version_affected": "\u003c", "version_value": "2.19.134" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.44" }, { "version_affected": "\u003c", "version_value": "2.19.134" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.51" }, { "version_affected": "\u003c", "version_value": "2.19.51" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.51" }, { "version_affected": "\u003c", "version_value": "2.19.51" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp for Windows Phone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.348" }, { "version_affected": "\u003c", "version_value": "2.18.348" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp for Tizen", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.15" }, { "version_affected": "\u003c", "version_value": "2.18.15" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-3568", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2019-3568" }, { "name": "108329", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108329" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3568", "datePublished": "2019-05-14T19:52:40.000Z", "dateReserved": "2019-01-02T00:00:00.000Z", "dateUpdated": "2025-07-30T01:46:03.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1901 (GCVE-0-2020-1901)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp for iOS |
Version: 2.20.91.4 Version: unspecified < 2.20.91.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.462Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.91.4" }, { "lessThan": "2.20.91.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:24", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1901", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.91.4" }, { "version_affected": "\u003c", "version_value": "2.20.91.4" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Receiving a large text message containing URLs in WhatsApp for iOS prior to v2.20.91.4 could have caused the application to freeze while processing the message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1901", "datePublished": "2020-10-06T17:35:24", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:54:00.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38537 (GCVE-0-2023-38537)
Vulnerability from cvelistv5
Published
2023-10-04 19:09
Modified
2024-09-19 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Desktop for Mac |
Version: 0 ≤ |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38537", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:27:15.314042Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:27:23.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "WhatsApp Desktop for Mac", "vendor": "Facebook", "versions": [ { "lessThan": "2.2338.12", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Desktop for Windows", "vendor": "Facebook", "versions": [ { "lessThan": "2.2320.2", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "dateAssigned": "2023-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A race condition in a network transport subsystem led to a heap use-after-free issue in established or unsilenced incoming audio/video calls that could have resulted in app termination or unexpected control flow with very low probability." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-416, CWE-366", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-04T19:09:58.086Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2023-38537", "datePublished": "2023-10-04T19:09:58.086Z", "dateReserved": "2023-07-19T20:34:49.827Z", "dateUpdated": "2024-09-19T15:27:23.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6349 (GCVE-0-2018-6349)
Vulnerability from cvelistv5
Published
2019-06-14 17:02
Modified
2024-08-05 06:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow ()
Summary
When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.18.248 Version: unspecified < 2.18.248 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6349/" }, { "name": "108804", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108804" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.248" }, { "lessThan": "2.18.248", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.132" }, { "lessThan": "2.18.132", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-18T17:06:04", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6349/" }, { "name": "108804", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108804" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-30", "ID": "CVE-2018-6349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.248" }, { "version_affected": "\u003c", "version_value": "2.18.248" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.132" }, { "version_affected": "\u003c", "version_value": "2.18.132" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2018-6349/", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2018-6349/" }, { "name": "108804", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108804" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6349", "datePublished": "2019-06-14T17:02:57", "dateReserved": "2018-01-26T00:00:00", "dateUpdated": "2024-08-05T06:01:48.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1907 (GCVE-0-2020-1907)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.20.196.16 Version: unspecified < 2.20.196.16 |
||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.972Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.196.16" }, { "lessThan": "2.20.196.16", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.196.12" }, { "lessThan": "2.20.196.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.90" }, { "lessThan": "2.20.90", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.90" }, { "lessThan": "2.20.90", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Portal", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "173.0.0.29.505" }, { "lessThan": "173.0.0.29.505", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:27", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1907", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.196.16" }, { "version_affected": "\u003c", "version_value": "2.20.196.16" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.196.12" }, { "version_affected": "\u003c", "version_value": "2.20.196.12" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.90" }, { "version_affected": "\u003c", "version_value": "2.20.90" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.90" }, { "version_affected": "\u003c", "version_value": "2.20.90" } ] } }, { "product_name": "WhatsApp for Portal", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "173.0.0.29.505" }, { "version_affected": "\u003c", "version_value": "173.0.0.29.505" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1907", "datePublished": "2020-10-06T17:35:27", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1891 (GCVE-0-2020-1891)
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write ()
Summary
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Android |
Version: 2.20.17 Version: unspecified < 2.20.17 |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.17" }, { "lessThan": "2.20.17", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.7" }, { "lessThan": "2.20.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1891", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.17" }, { "version_affected": "\u003c", "version_value": "2.20.17" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.7" }, { "version_affected": "\u003c", "version_value": "2.20.7" } ] } }, { "product_name": "WhatsApp iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } }, { "product_name": "WhatsApp Business for iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1891", "datePublished": "2020-09-03T21:10:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11927 (GCVE-0-2019-11927)
Vulnerability from cvelistv5
Published
2019-09-27 20:14
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-190 - Integer Overflow or Wraparound ()
Summary
An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: before version 2.19.143 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11927" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "before version 2.19.143" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "before version 2.19.100" } ] } ], "dateAssigned": "2019-09-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-190", "description": "Integer Overflow or Wraparound (CWE-190)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-27T20:14:48", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11927" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-09-27", "ID": "CVE-2019-11927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_value": "before version 2.19.143" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_value": "before version 2.19.100" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsApp for iOS before version 2.19.100." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow or Wraparound (CWE-190)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-11927", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11927" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11927", "datePublished": "2019-09-27T20:14:48", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3566 (GCVE-0-2019-3566)
Vulnerability from cvelistv5
Published
2019-05-10 20:58
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control ()
Summary
A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.19.104 Version: 2.19.54 < unspecified Version: 2.19.52 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3566" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.104" }, { "lessThan": "unspecified", "status": "affected", "version": "2.19.54", "versionType": "custom" }, { "status": "affected", "version": "2.19.52" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.38" }, { "lessThan": "unspecified", "status": "affected", "version": "2.19.22", "versionType": "custom" } ] } ], "dateAssigned": "2019-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A bug in WhatsApp for Android\u0027s messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user\u0027s account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control (CWE-284)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-05-15T15:48:59", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3566" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-05-09", "ID": "CVE-2019-3566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.104" }, { "version_affected": "\u003e=", "version_value": "2.19.54" }, { "version_affected": "=", "version_value": "2.19.52" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.38" }, { "version_affected": "\u003e=", "version_value": "2.19.22" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug in WhatsApp for Android\u0027s messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user\u0027s account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control (CWE-284)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-3566", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2019-3566" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3566", "datePublished": "2019-05-10T20:58:02", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1905 (GCVE-0-2020-1905)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-340 - Generation of Predictable Numbers or Identifiers
Summary
Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp for Android |
Version: 2.20.185 Version: unspecified < 2.20.185 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.185" }, { "lessThan": "2.20.185", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-340", "description": "CWE-340: Generation of Predictable Numbers or Identifiers", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:26", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1905", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.185" }, { "version_affected": "\u003c", "version_value": "2.20.185" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Media ContentProvider URIs used for opening attachments in other apps were generated sequentially prior to WhatsApp for Android v2.20.185, which could have allowed a malicious third party app chosen to open the file to guess the URIs for previously opened attachments until the opener app is terminated." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-340: Generation of Predictable Numbers or Identifiers" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1905", "datePublished": "2020-10-06T17:35:26", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-20655 (GCVE-0-2018-20655)
Vulnerability from cvelistv5
Published
2019-06-14 17:02
Modified
2024-08-05 12:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow ()
Summary
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for iOS |
Version: 2.18.90.24 Version: unspecified < 2.18.90.24 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T12:05:17.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2018-20655/" }, { "name": "108805", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108805" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.90.24" }, { "lessThan": "2.18.90.24", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.90.24" }, { "lessThan": "2.18.90.24", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-18T17:06:04", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2018-20655/" }, { "name": "108805", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108805" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-30", "ID": "CVE-2018-20655", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.90.24" }, { "version_affected": "\u003c", "version_value": "2.18.90.24" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.90.24" }, { "version_affected": "\u003c", "version_value": "2.18.90.24" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2018-20655/", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2018-20655/" }, { "name": "108805", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108805" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-20655", "datePublished": "2019-06-14T17:02:57", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-05T12:05:17.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24043 (GCVE-0-2021-24043)
Vulnerability from cvelistv5
Published
2022-02-02 11:59
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "dateAssigned": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T11:59:31", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-11-09", "ID": "CVE-2021-24043", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing bound check in RTCP flag parsing code prior to WhatsApp for Android v2.21.23.2, WhatsApp Business for Android v2.21.23.2, WhatsApp for iOS v2.21.230.6, WhatsApp Business for iOS 2.21.230.7, and WhatsApp Desktop v2.2145.0 could have allowed an out-of-bounds heap read if a user sent a malformed RTCP packet during an established call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24043", "datePublished": "2022-02-02T11:59:31", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30401 (GCVE-0-2025-30401)
Vulnerability from cvelistv5
Published
2025-04-05 11:47
Modified
2025-04-09 17:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment’s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp Desktop for Windows |
Version: 0.0.0 ≤ |
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-30401", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T14:35:23.677082Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:30:10.813Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "WhatsApp Desktop for Windows", "vendor": "Facebook", "versions": [ { "lessThan": "2.2450.6", "status": "affected", "version": "0.0.0", "versionType": "semver" } ] } ], "dateAssigned": "2025-03-25T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A spoofing issue in WhatsApp for Windows prior to version 2.2450.6 displayed attachments according to their MIME type but selected the file opening handler based on the attachment\u2019s filename extension. A maliciously crafted mismatch could have caused the recipient to inadvertently execute arbitrary code rather than view the attachment when manually opening the attachment inside WhatsApp. We have not seen evidence of exploitation in the wild." } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-430", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T17:19:56.351Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2025-30401" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2025/" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2025-30401", "datePublished": "2025-04-05T11:47:54.836Z", "dateReserved": "2025-03-21T19:52:56.084Z", "dateUpdated": "2025-04-09T17:19:56.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-3571 (GCVE-0-2019-3571)
Vulnerability from cvelistv5
Published
2019-07-16 20:16
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-116 - Improper Encoding or Escaping of Output (), Improper Handling of Unicode Encoding (CWE-176)
Summary
An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp Desktop |
Version: 0.3.3793 Version: unspecified < 0.3.3793 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3571" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Desktop", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "0.3.3793" }, { "lessThan": "0.3.3793", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-07-16T00:00:00", "datePublic": "2019-07-16T00:00:00", "descriptions": [ { "lang": "en", "value": "An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "Improper Encoding or Escaping of Output (CWE-116), Improper Handling of Unicode Encoding (CWE-176)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-07-16T20:16:35", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-3571" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-07-16", "ID": "CVE-2019-3571", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Desktop", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "0.3.3793" }, { "version_affected": "\u003c", "version_value": "0.3.3793" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Encoding or Escaping of Output (CWE-116), Improper Handling of Unicode Encoding (CWE-176)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-3571", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-3571" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-3571", "datePublished": "2019-07-16T20:16:35", "dateReserved": "2019-01-02T00:00:00", "dateUpdated": "2024-08-04T19:12:09.515Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-36934 (GCVE-0-2022-36934)
Vulnerability from cvelistv5
Published
2022-09-22 21:30
Modified
2025-05-27 16:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An integer overflow in WhatsApp could result in remote code execution in an established video call.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Meta | WhatsApp for iOS |
Version: unspecified < 2.22.16.12 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-36934", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-05-27T16:05:45.458311Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-27T16:05:50.201Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp for iOS", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.12", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-07-27T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "An integer overflow in WhatsApp could result in remote code execution in an established video call." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-22T21:30:11.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-07-27", "ID": "CVE-2022-36934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.12" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.12" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.12" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.12" } ] } } ] }, "vendor_name": "Meta" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer overflow in WhatsApp could result in remote code execution in an established video call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2022/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2022/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-36934", "datePublished": "2022-09-22T21:30:11.000Z", "dateReserved": "2022-07-27T00:00:00.000Z", "dateUpdated": "2025-05-27T16:05:50.201Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1904 (GCVE-0-2020-1904)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlsx, and pptx files as attachments to messages.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for iOS |
Version: 2.20.61 Version: unspecified < 2.20.61 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.61" }, { "lessThan": "2.20.61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.61" }, { "lessThan": "2.20.61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlsx, and pptx files as attachments to messages." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-02T11:59:30", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1904", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.61" }, { "version_affected": "\u003c", "version_value": "2.20.61" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.61" }, { "version_affected": "\u003c", "version_value": "2.20.61" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A path validation issue in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have allowed for directory traversal overwriting files when sending specially crafted docx, xlsx, and pptx files as attachments to messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1904", "datePublished": "2020-10-06T17:35:26", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:54:00.435Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24042 (GCVE-0-2021-24042)
Vulnerability from cvelistv5
Published
2022-01-04 18:55
Modified
2025-05-22 18:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Desktop |
Version: unspecified < v2.2146 Patch: v2.2146 < unspecified |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-24042", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T17:29:44.436259Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-22T18:36:53.143Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp Desktop", "vendor": "Facebook", "versions": [ { "lessThan": "v2.2146", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.2146", "versionType": "custom" } ] }, { "product": "WhatsApp for KaiOS", "vendor": "Facebook", "versions": [ { "lessThan": "v2.2143", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.2143", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.230", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.230", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.230", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.230", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.23", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.23", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.23", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.23", "versionType": "custom" } ] } ], "dateAssigned": "2021-11-09T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-04T18:55:08.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-11-09", "ID": "CVE-2021-24042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Desktop", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.2146" }, { "version_affected": "!\u003e=", "version_value": "v2.2146" } ] } }, { "product_name": "WhatsApp for KaiOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.2143" }, { "version_affected": "!\u003e=", "version_value": "v2.2143" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.230" }, { "version_affected": "!\u003e=", "version_value": "v2.21.230" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.230" }, { "version_affected": "!\u003e=", "version_value": "v2.21.230" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.23" }, { "version_affected": "!\u003e=", "version_value": "v2.21.23" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.23" }, { "version_affected": "!\u003e=", "version_value": "v2.21.23" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The calling logic for WhatsApp for Android prior to v2.21.23, WhatsApp Business for Android prior to v2.21.23, WhatsApp for iOS prior to v2.21.230, WhatsApp Business for iOS prior to v2.21.230, WhatsApp for KaiOS prior to v2.2143, WhatsApp Desktop prior to v2.2146 could have allowed an out-of-bounds write if a user makes a 1:1 call to a malicious actor." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24042", "datePublished": "2022-01-04T18:55:08.000Z", "dateReserved": "2021-01-13T00:00:00.000Z", "dateUpdated": "2025-05-22T18:36:53.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-20096 (GCVE-0-2020-20096)
Vulnerability from cvelistv5
Published
2022-03-23 21:28
Modified
2024-08-04 14:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T14:15:29.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/zadewg/RIUS" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-25T16:06:15", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/zadewg/RIUS" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-20096", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Whatsapp iOS 2.19.80 and prior and Android 2.19.222 and prior user interface does not properly represent URI messages to the user, which results in URI spoofing via specially crafted messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/zadewg/RIUS", "refsource": "MISC", "url": "https://github.com/zadewg/RIUS" }, { "name": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/166448/RTLO-Injection-URI-Spoofing.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-20096", "datePublished": "2022-03-23T21:28:54", "dateReserved": "2020-08-13T00:00:00", "dateUpdated": "2024-08-04T14:15:29.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1886 (GCVE-0-2020-1886)
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Summary
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.20.11 Version: unspecified < 2.20.11 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.11" }, { "lessThan": "2.20.11", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.2" }, { "lessThan": "2.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:17", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1886", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.11" }, { "version_affected": "\u003c", "version_value": "2.20.11" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.2" }, { "version_affected": "\u003c", "version_value": "2.20.2" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1886", "datePublished": "2020-09-03T21:10:18", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.886Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1903 (GCVE-0-2020-1903)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-400 - Uncontrolled Resource Consumption
Summary
An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver's WhatsApp contacts.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for iOS |
Version: 2.20.61 Version: unspecified < 2.20.61 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.61" }, { "lessThan": "2.20.61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.61" }, { "lessThan": "2.20.61", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver\u0027s WhatsApp contacts." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400: Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:25", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.61" }, { "version_affected": "\u003c", "version_value": "2.20.61" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.61" }, { "version_affected": "\u003c", "version_value": "2.20.61" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue when unzipping docx, pptx, and xlsx documents in WhatsApp for iOS prior to v2.20.61 and WhatsApp Business for iOS prior to v2.20.61 could have resulted in an out-of-memory denial of service. This issue would have required the receiver to explicitly open the attachment if it was received from a number not in the receiver\u0027s WhatsApp contacts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-400: Uncontrolled Resource Consumption" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1903", "datePublished": "2020-10-06T17:35:25", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11931 (GCVE-0-2019-11931)
Vulnerability from cvelistv5
Published
2019-11-14 22:55
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow ()
Summary
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.19.274 Version: unspecified < 2.19.274 |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.691Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11931" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.274" }, { "lessThan": "2.19.274", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.100" }, { "lessThan": "2.19.100", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Windows Phone", "vendor": "Facebook", "versions": [ { "lessThanOrEqual": "2.18.368", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Enterprise Client", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.25.3" }, { "lessThan": "2.25.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.104" }, { "lessThan": "2.19.104", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.100" }, { "lessThan": "2.19.100", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-11-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-14T22:55:52", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11931" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-11-14", "ID": "CVE-2019-11931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.274" }, { "version_affected": "\u003c", "version_value": "2.19.274" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.100" }, { "version_affected": "\u003c", "version_value": "2.19.100" } ] } }, { "product_name": "WhatsApp for Windows Phone", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "2.18.368" } ] } }, { "product_name": "WhatsApp Enterprise Client", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.25.3" }, { "version_affected": "\u003c", "version_value": "2.25.3" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.104" }, { "version_affected": "\u003c", "version_value": "2.19.104" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.100" }, { "version_affected": "\u003c", "version_value": "2.19.100" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-11931", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11931" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11931", "datePublished": "2019-11-14T22:55:52", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24026 (GCVE-0-2021-24026)
Vulnerability from cvelistv5
Published
2021-04-06 16:45
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for iOS |
Version: unspecified < v2.21.32 |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.32", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.32", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2021-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-06T16:45:15", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-04-06", "ID": "CVE-2021-24026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.32" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.32" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.3" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.3" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing bounds check within the audio decoding pipeline for WhatsApp calls in WhatsApp for Android prior to v2.21.3, WhatsApp Business for Android prior to v2.21.3, WhatsApp for iOS prior to v2.21.32, and WhatsApp Business for iOS prior to v2.21.32 could have allowed an out-of-bounds write." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24026", "datePublished": "2021-04-06T16:45:15", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11933 (GCVE-0-2019-11933)
Vulnerability from cvelistv5
Published
2019-10-23 15:40
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer ()
Summary
A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp for Android |
Version: 2.19.291 Version: unspecified < 2.19.291 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.463Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11933" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.19.291" }, { "lessThan": "2.19.291", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-22T00:00:00", "descriptions": [ { "lang": "en", "value": "A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-23T15:40:10", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11933" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-22", "ID": "CVE-2019-11933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.19.291" }, { "version_affected": "\u003c", "version_value": "2.19.291" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-11933", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11933" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11933", "datePublished": "2019-10-23T15:40:10", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.463Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-18426 (GCVE-0-2019-18426)
Vulnerability from cvelistv5
Published
2020-01-21 20:30
Modified
2025-07-30 01:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') ()
Summary
A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
WhatsApp Desktop |
Version: 0.3.9309 Version: unspecified < 0.3.9309 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T01:54:14.379Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-18426" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2019-18426", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-07T12:55:17.810586Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-05-23", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-18426" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:45:50.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-05-23T00:00:00+00:00", "value": "CVE-2019-18426 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp Desktop", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "0.3.9309" }, { "lessThan": "0.3.9309", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-01-21T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) (CWE-79)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-06T20:06:48.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-18426" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-01-21", "ID": "CVE-2019-18426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Desktop", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "0.3.9309" }, { "version_affected": "\u003c", "version_value": "0.3.9309" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in WhatsApp Desktop versions prior to 0.3.9309 when paired with WhatsApp for iPhone versions prior to 2.20.10 allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027) (CWE-79)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-18426", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-18426" }, { "name": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/157097/WhatsApp-Desktop-0.3.9308-Cross-Site-Scripting.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-18426", "datePublished": "2020-01-21T20:30:15.000Z", "dateReserved": "2019-10-25T00:00:00.000Z", "dateUpdated": "2025-07-30T01:45:50.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1908 (GCVE-0-2020-1908)
Vulnerability from cvelistv5
Published
2020-11-03 19:15
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for iOS |
Version: 2.20.100 Version: unspecified < 2.20.100 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.916Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.100" }, { "lessThan": "2.20.100", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.100" }, { "lessThan": "2.20.100", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285: Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-03T19:15:16", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-11-03", "ID": "CVE-2020-1908", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.100" }, { "version_affected": "\u003c", "version_value": "2.20.100" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.100" }, { "version_affected": "\u003c", "version_value": "2.20.100" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper authorization of the Screen Lock feature in WhatsApp and WhatsApp Business for iOS prior to v2.20.100 could have permitted use of Siri to interact with the WhatsApp application even after the phone was locked." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-285: Improper Authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1908", "datePublished": "2020-11-03T19:15:16", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6350 (GCVE-0-2018-6350)
Vulnerability from cvelistv5
Published
2019-06-14 17:02
Modified
2024-08-05 06:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read ()
Summary
An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.18.276 Version: unspecified < 2.18.276 |
||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.744Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6350/" }, { "name": "108803", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108803" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.276" }, { "lessThan": "2.18.276", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.99" }, { "lessThan": "2.18.99", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.100.6" }, { "lessThan": "2.18.100.6", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.100.2" }, { "lessThan": "2.18.100.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Windows Phone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.224" }, { "lessThan": "2.18.224", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read (CWE-125)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-18T16:06:03", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6350/" }, { "name": "108803", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108803" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-30", "ID": "CVE-2018-6350", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.276" }, { "version_affected": "\u003c", "version_value": "2.18.276" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.99" }, { "version_affected": "\u003c", "version_value": "2.18.99" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.100.6" }, { "version_affected": "\u003c", "version_value": "2.18.100.6" } ] } }, { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.100.2" }, { "version_affected": "\u003c", "version_value": "2.18.100.2" } ] } }, { "product_name": "WhatsApp for Windows Phone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.224" }, { "version_affected": "\u003c", "version_value": "2.18.224" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read (CWE-125)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2018-6350/", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2018-6350/" }, { "name": "108803", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108803" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6350", "datePublished": "2019-06-14T17:02:57", "dateReserved": "2018-01-26T00:00:00", "dateUpdated": "2024-08-05T06:01:48.744Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-8769 (GCVE-0-2017-8769)
Vulnerability from cvelistv5
Published
2017-05-18 06:13
Modified
2024-08-05 16:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who expect file deletion to occur upon chat deletion, or who expect encryption (consistent with the application's use of an encrypted database to store chat text). NOTE: the vendor reportedly indicates that they do not "consider these to be security issues" because a user may legitimately want to preserve any file for use "in other apps like the Google Photos gallery" regardless of whether its associated chat is deleted
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T16:48:21.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/" }, { "name": "100906", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100906" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-05-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who expect file deletion to occur upon chat deletion, or who expect encryption (consistent with the application\u0027s use of an encrypted database to store chat text). NOTE: the vendor reportedly indicates that they do not \"consider these to be security issues\" because a user may legitimately want to preserve any file for use \"in other apps like the Google Photos gallery\" regardless of whether its associated chat is deleted" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-27T17:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/" }, { "name": "100906", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100906" } ], "tags": [ "disputed" ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-8769", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "** DISPUTED ** Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who expect file deletion to occur upon chat deletion, or who expect encryption (consistent with the application\u0027s use of an encrypted database to store chat text). NOTE: the vendor reportedly indicates that they do not \"consider these to be security issues\" because a user may legitimately want to preserve any file for use \"in other apps like the Google Photos gallery\" regardless of whether its associated chat is deleted." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/", "refsource": "MISC", "url": "https://wwws.nightwatchcybersecurity.com/2017/05/17/advisory-whatsapp-for-android-privacy-issues-with-handling-of-media-files-cve-2017-8769/" }, { "name": "100906", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100906" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-8769", "datePublished": "2017-05-18T06:13:00", "dateReserved": "2017-05-03T00:00:00", "dateUpdated": "2024-08-05T16:48:21.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1906 (GCVE-0-2020-1906)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.20.130 Version: unspecified < 2.20.130 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.903Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.130" }, { "lessThan": "2.20.130", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.46" }, { "lessThan": "2.20.46", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122: Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:26", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1906", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.130" }, { "version_affected": "\u003c", "version_value": "2.20.130" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.46" }, { "version_affected": "\u003c", "version_value": "2.20.46" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A buffer overflow in WhatsApp for Android prior to v2.20.130 and WhatsApp Business for Android prior to v2.20.46 could have allowed an out-of-bounds write when processing malformed local videos with E-AC-3 audio streams." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122: Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1906", "datePublished": "2020-10-06T17:35:26", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.903Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1902 (GCVE-0-2020-1902)
Vulnerability from cvelistv5
Published
2020-10-06 17:35
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.20.140 Version: unspecified < 2.20.140 Patch: unspecified < 2.20.108 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.140" }, { "lessThan": "2.20.140", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.20.108", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.49" }, { "lessThan": "2.20.49", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "2.20.35", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-10-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-06T17:35:25", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-10-06", "ID": "CVE-2020-1902", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.140" }, { "version_affected": "\u003c", "version_value": "2.20.140" }, { "version_affected": "!\u003c", "version_value": "2.20.108" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.49" }, { "version_affected": "\u003c", "version_value": "2.20.49" }, { "version_affected": "!\u003c", "version_value": "2.20.35" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A user running a quick search on a highly forwarded message on WhatsApp for Android from v2.20.108 to v2.20.140 or WhatsApp Business for Android from v2.20.35 to v2.20.49 could have been sent to the Google service over plain HTTP." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1902", "datePublished": "2020-10-06T17:35:25", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.913Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6339 (GCVE-0-2018-6339)
Vulnerability from cvelistv5
Published
2019-06-14 17:02
Modified
2024-08-05 06:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow ()
Summary
When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.18.295 Version: 2.18.180 < unspecified Patch: unspecified < 2.18.180 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.697Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6339/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.295" }, { "lessThan": "unspecified", "status": "affected", "version": "2.18.180", "versionType": "custom" }, { "lessThan": "2.18.180", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.150" }, { "lessThan": "unspecified", "status": "affected", "version": "2.18.103", "versionType": "custom" }, { "lessThan": "2.18.103", "status": "unaffected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-12-30T00:00:00", "descriptions": [ { "lang": "en", "value": "When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based Buffer Overflow (CWE-121)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-06-14T17:02:57", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.facebook.com/security/advisories/cve-2018-6339/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-12-30", "ID": "CVE-2018-6339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.295" }, { "version_affected": "\u003e=", "version_value": "2.18.180" }, { "version_affected": "!\u003c", "version_value": "2.18.180" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.150" }, { "version_affected": "\u003e=", "version_value": "2.18.103" }, { "version_affected": "!\u003c", "version_value": "2.18.103" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stack-based Buffer Overflow (CWE-121)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2018-6339/", "refsource": "MISC", "url": "https://www.facebook.com/security/advisories/cve-2018-6339/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6339", "datePublished": "2019-06-14T17:02:57", "dateReserved": "2018-01-26T00:00:00", "dateUpdated": "2024-08-05T06:01:48.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24027 (GCVE-0-2021-24027)
Vulnerability from cvelistv5
Published
2021-04-06 16:45
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device’s external storage to read cached TLS material.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for Android |
Version: v2.21.4.18 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.148Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "v2.21.4.18" } ] }, { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.4.18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2021-04-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device\u2019s external storage to read cached TLS material." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-524", "description": "CWE-524", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-06T16:45:15", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-04-06", "ID": "CVE-2021-24027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "=", "version_value": "v2.21.4.18" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.4.18" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cache configuration issue prior to WhatsApp for Android v2.21.4.18 and WhatsApp Business for Android v2.21.4.18 may have allowed a third party with access to the device\u2019s external storage to read cached TLS material." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-524" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24027", "datePublished": "2021-04-06T16:45:15", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.148Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1894 (GCVE-0-2020-1894)
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write ()
Summary
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Android |
Version: 2.20.35 Version: unspecified < 2.20.35 |
|||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.35" }, { "lessThan": "2.20.35", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.30" }, { "lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.30" }, { "lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.35" }, { "version_affected": "\u003c", "version_value": "2.20.35" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } }, { "product_name": "WhatsApp iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.30" }, { "version_affected": "\u003c", "version_value": "2.20.30" } ] } }, { "product_name": "WhatsApp Business for iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.30" }, { "version_affected": "\u003c", "version_value": "2.20.30" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1894", "datePublished": "2020-09-03T21:10:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-27492 (GCVE-0-2022-27492)
Vulnerability from cvelistv5
Published
2022-09-23 14:00
Modified
2025-05-22 18:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | Meta | WhatsApp Business for iOS |
Version: unspecified < v2.22.15.9 |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T05:32:57.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-27492", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-22T15:47:52.158526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-22T18:26:38.922Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp Business for iOS", "vendor": "Meta", "versions": [ { "lessThan": "v2.22.15.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Meta", "versions": [ { "lessThan": "v2.22.15.9", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Meta", "versions": [ { "lessThan": "2.22.16.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2022-06-28T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-23T14:00:14.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2022/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2022-06-28", "ID": "CVE-2022-27492", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.22.15.9 " } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.22.15.9 " } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.2" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "2.22.16.2" } ] } } ] }, "vendor_name": "Meta" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An integer underflow in WhatsApp could have caused remote code execution when receiving a crafted video file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-191" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2022/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2022/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2022-27492", "datePublished": "2022-09-23T14:00:14.000Z", "dateReserved": "2022-03-21T00:00:00.000Z", "dateUpdated": "2025-05-22T18:26:38.922Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1909 (GCVE-0-2020-1909)
Vulnerability from cvelistv5
Published
2020-11-03 19:15
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for iOS |
Version: 2.20.111 Version: unspecified < 2.20.111 Version: 2.20.81 < unspecified |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.111" }, { "lessThan": "2.20.111", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "2.20.81", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.111" }, { "lessThan": "2.20.111", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "2.20.81", "versionType": "custom" } ] } ], "dateAssigned": "2020-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-03T19:15:17", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-11-03", "ID": "CVE-2020-1909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.111" }, { "version_affected": "\u003c", "version_value": "2.20.111" }, { "version_affected": "\u003e=", "version_value": "2.20.81" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.111" }, { "version_affected": "\u003c", "version_value": "2.20.111" }, { "version_affected": "\u003e=", "version_value": "2.20.81" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1909", "datePublished": "2020-11-03T19:15:17", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24041 (GCVE-0-2021-24041)
Vulnerability from cvelistv5
Published
2021-12-07 19:10
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for Android |
Version: unspecified < v2.21.22.7 Patch: v2.21.22.7 < unspecified |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.331Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.22.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.22.7", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.22.7", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.22.7", "versionType": "custom" } ] } ], "dateAssigned": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T19:10:09", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-11-09", "ID": "CVE-2021-24041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.22.7" }, { "version_affected": "!\u003e=", "version_value": "v2.21.22.7" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.22.7" }, { "version_affected": "!\u003e=", "version_value": "v2.21.22.7" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing bounds check in image blurring code prior to WhatsApp for Android v2.21.22.7 and WhatsApp Business for Android v2.21.22.7 could have allowed an out-of-bounds write if a user sent a malicious image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24041", "datePublished": "2021-12-07T19:10:09", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.331Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-6344 (GCVE-0-2018-6344)
Vulnerability from cvelistv5
Published
2018-12-31 22:00
Modified
2025-05-06 16:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow ()
Summary
A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.18.293 Version: unspecified < 2.18.293 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:01:48.708Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" }, { "name": "106365", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106365" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2018-6344", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-06T16:01:47.642323Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-06T16:02:35.127Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.293" }, { "lessThan": "2.18.293", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.93" }, { "lessThan": "2.18.93", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Windows Phone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.18.172" }, { "lessThan": "2.18.172", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2018-11-21T00:00:00.000Z", "datePublic": "2018-12-31T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "Heap-based Buffer Overflow (CWE-122)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-01T10:57:01.000Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" }, { "name": "106365", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106365" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2018-11-21", "ID": "CVE-2018-6344", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.293" }, { "version_affected": "\u003c", "version_value": "2.18.293" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.93" }, { "version_affected": "\u003c", "version_value": "2.18.93" } ] } } ] }, "vendor_name": "Facebook" }, { "product": { "product_data": [ { "product_name": "WhatsApp for Windows Phone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.18.172" }, { "version_affected": "\u003c", "version_value": "2.18.172" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow (CWE-122)" } ] } ] }, "references": { "reference_data": [ { "name": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html", "refsource": "MISC", "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" }, { "name": "106365", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106365" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2018-6344", "datePublished": "2018-12-31T22:00:00.000Z", "dateReserved": "2018-01-26T00:00:00.000Z", "dateUpdated": "2025-05-06T16:02:35.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-11932 (GCVE-0-2019-11932)
Vulnerability from cvelistv5
Published
2019-10-03 21:13
Modified
2024-08-04 23:10
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-415 - Double free ()
Summary
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
References
► | URL | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
koral-- | android-gif-drawable |
Version: unspecified < 1.2.18 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T23:10:29.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11932" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/" }, { "name": "20191126 CVE-2019-11932 (double free in libpl_droidsonroids_gif) many apps vulnerable", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2019/Nov/27" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "android-gif-drawable", "vendor": "koral--", "versions": [ { "lessThan": "1.2.18", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2019-10-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-415", "description": "Double free (CWE-415)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-27T14:16:18", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.facebook.com/security/advisories/cve-2019-11932" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/koral--/android-gif-drawable/pull/673" }, { "tags": [ "x_refsource_MISC" ], "url": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/" }, { "name": "20191126 CVE-2019-11932 (double free in libpl_droidsonroids_gif) many apps vulnerable", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2019/Nov/27" }, { "tags": [ "x_refsource_MISC" ], "url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2019-10-03", "ID": "CVE-2019-11932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "android-gif-drawable", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.2.18" } ] } } ] }, "vendor_name": "koral--" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free (CWE-415)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.facebook.com/security/advisories/cve-2019-11932", "refsource": "CONFIRM", "url": "https://www.facebook.com/security/advisories/cve-2019-11932" }, { "name": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html" }, { "name": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9", "refsource": "CONFIRM", "url": "https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9" }, { "name": "https://github.com/koral--/android-gif-drawable/pull/673", "refsource": "CONFIRM", "url": "https://github.com/koral--/android-gif-drawable/pull/673" }, { "name": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/", "refsource": "MISC", "url": "https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/" }, { "name": "20191126 CVE-2019-11932 (double free in libpl_droidsonroids_gif) many apps vulnerable", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2019/Nov/27" }, { "name": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263", "refsource": "MISC", "url": "https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263" }, { "name": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html" }, { "name": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20", "refsource": "MISC", "url": "https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2019-11932", "datePublished": "2019-10-03T21:13:47", "dateReserved": "2019-05-13T00:00:00", "dateUpdated": "2024-08-04T23:10:29.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-24035 (GCVE-0-2021-24035)
Vulnerability from cvelistv5
Published
2021-06-11 03:35
Modified
2024-08-03 19:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for Android |
Version: unspecified < v2.21.8.13 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T19:21:17.185Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.8.13", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "v2.21.8.13", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2021-04-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-11T03:35:10", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-04-21", "ID": "CVE-2021-24035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.8.13" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.8.13" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A lack of filename validation when unzipping archives prior to WhatsApp for Android v2.21.8.13 and WhatsApp Business for Android v2.21.8.13 could have allowed path traversal attacks that overwrite WhatsApp files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-23: Relative Path Traversal" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2021-24035", "datePublished": "2021-06-11T03:35:10", "dateReserved": "2021-01-13T00:00:00", "dateUpdated": "2024-08-03T19:21:17.185Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-38538 (GCVE-0-2023-38538)
Vulnerability from cvelistv5
Published
2023-10-04 19:10
Modified
2024-09-19 15:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Desktop for Mac |
Version: 0 ≤ |
|||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:46:56.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38538", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-19T15:27:40.316899Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-19T15:27:48.295Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "WhatsApp Desktop for Mac", "vendor": "Facebook", "versions": [ { "lessThan": "2.2338.12", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Desktop for Windows", "vendor": "Facebook", "versions": [ { "lessThan": "2.2320.2", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] }, { "defaultStatus": "affected", "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "lessThan": "2.23.10.77", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "dateAssigned": "2023-07-19T00:00:00", "descriptions": [ { "lang": "en", "value": "A race condition in an event subsystem led to a heap use-after-free issue in established audio/video calls that could have resulted in app termination or unexpected control flow with very low probability." } ], "metrics": [ { "cvssV3_1": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-416, CWE-366", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-04T19:10:49.627Z", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2023/" } ] } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2023-38538", "datePublished": "2023-10-04T19:10:49.627Z", "dateReserved": "2023-07-19T20:34:49.827Z", "dateUpdated": "2024-09-19T15:27:48.295Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1910 (GCVE-0-2020-1910)
Vulnerability from cvelistv5
Published
2021-02-02 19:55
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp Business for Android |
Version: unspecified < v2.21.1.13 Patch: v2.21.1.13 < unspecified |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for Android", "vendor": "WhatsApp", "versions": [ { "lessThan": "v2.21.1.13", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.1.13", "versionType": "custom" } ] }, { "product": "WhatsApp for Android", "vendor": "WhatsApp", "versions": [ { "lessThan": "v2.21.1.13", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "unaffected", "version": "v2.21.1.13", "versionType": "custom" } ] } ], "dateAssigned": "2021-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-02T19:55:13", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2021/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2021-02-02", "ID": "CVE-2020-1910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.1.13" }, { "version_affected": "!\u003e=", "version_value": "v2.21.1.13" } ] } }, { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "v2.21.1.13" }, { "version_affected": "!\u003e=", "version_value": "v2.21.1.13" } ] } } ] }, "vendor_name": "WhatsApp" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A missing bounds check in WhatsApp for Android prior to v2.21.1.13 and WhatsApp Business for Android prior to v2.21.1.13 could have allowed out-of-bounds read and write if a user applied specific image filters to a specially crafted image and sent the resulting image." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2021/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2021/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1910", "datePublished": "2021-02-02T19:55:13", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-1890 (GCVE-0-2020-1890)
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | WhatsApp for Android |
Version: 2.20.11 Version: unspecified < 2.20.11 |
|||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.902Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.11" }, { "lessThan": "2.20.11", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.2" }, { "lessThan": "2.20.2", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:18", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1890", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.11" }, { "version_affected": "\u003c", "version_value": "2.20.11" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.2" }, { "version_affected": "\u003c", "version_value": "2.20.2" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1890", "datePublished": "2020-09-03T21:10:18", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.902Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }