Описание
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 2.20.30 (исключая)Версия до 2.20.35 (исключая)Версия до 2.20.20 (исключая)Версия до 2.20.30 (исключая)
Одно из
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*
cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*
cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*
EPSS
Процентиль: 72%
0.00727
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-787
CWE-787
Связанные уязвимости
github
около 3 лет назад
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
EPSS
Процентиль: 72%
0.00727
Низкий
8.8 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-787
CWE-787