First published: Fri Jun 14 2019(Updated: )
When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.18.132 | |
Whatsapp Whatsapp | <2.18.248 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6349 is a vulnerability in WhatsApp for Android that allows for a stack-based overflow when receiving calls.
The severity of CVE-2018-6349 is critical, with a severity value of 9.8.
CVE-2018-6349 affects WhatsApp for Android versions prior to 2.18.248 and WhatsApp Business for Android versions prior to 2.18.132.
To fix CVE-2018-6349, update WhatsApp for Android to version 2.18.248 or later, and update WhatsApp Business for Android to version 2.18.132 or later.
More information about CVE-2018-6349 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/108804), [Facebook Security Advisories](https://www.facebook.com/security/advisories/cve-2018-6349/).