Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-1894

Опубликовано: 03 сент. 2020
Источник: nvd
CVSS3: 8.8
CVSS2: 6.8
EPSS Низкий

Описание

A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*
Версия до 2.20.30 (исключая)
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*
Версия до 2.20.35 (исключая)
cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*
Версия до 2.20.20 (исключая)
cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*
Версия до 2.20.30 (исключая)

EPSS

Процентиль: 72%
0.00727
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-787
CWE-787

Связанные уязвимости

github
около 3 лет назад

A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.

EPSS

Процентиль: 72%
0.00727
Низкий

8.8 High

CVSS3

6.8 Medium

CVSS2

Дефекты

CWE-787
CWE-787