First published: Fri Jun 14 2019(Updated: )
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.18.90.24 | |
Whatsapp Whatsapp | <2.18.90.24 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20655 is a vulnerability that allows for a stack-based overflow when receiving calls using WhatsApp for iOS.
CVE-2018-20655 affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
More information about CVE-2018-20655 can be found on the Security Focus website and the Facebook Security Advisories page.
The severity of CVE-2018-20655 is classified as critical with a severity value of 9.8.
The Common Weakness Enumeration (CWE) ID of CVE-2018-20655 is CWE-787 and CWE-121.