Stack-Based Buffer Overflow in WhatsApp Affecting Multiple Platforms
CVE-2019-11931
Key Information:
- Vendor
Facebook
- Vendor
- CVE Published:
- 14 November 2019
Badges
What is CVE-2019-11931?
A stack-based buffer overflow vulnerability in WhatsApp can be exploited by sending a specially crafted MP4 file to a user. This flaw exists in the parsing of elementary stream metadata within the MP4 file, potentially leading to Denial of Service (DoS) or Remote Code Execution (RCE). It affects specific versions across Android, iOS, and WhatsApp Business platforms prior to certain updates, posing significant security risks to users.
Affected Version(s)
WhatsApp Business for Android 2.19.104
WhatsApp Business for Android < 2.19.104
WhatsApp Business for iOS 2.19.100
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved