Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cmw5-mmg8-r4fr

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.

EPSS

Процентиль: 98%
0.45977
Средний

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-122
CWE-787

Связанные уязвимости

CVSS3: 9.8
nvd
больше 6 лет назад

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость приложения для обмена сообщениями и видеозвонков WhatsApp, связанная с выходом операции за границы буфера, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 98%
0.45977
Средний

9.8 Critical

CVSS3

Дефекты

CWE-119
CWE-122
CWE-787