First published: Fri Jun 14 2019(Updated: )
An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.18.99 | |
Whatsapp Whatsapp | <2.18.100.2 | |
Whatsapp Whatsapp | <2.18.100.6 | |
Whatsapp Whatsapp | <2.18.224 | |
Whatsapp Whatsapp | <2.18.276 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6350 is an out-of-bounds read vulnerability in WhatsApp due to incorrect parsing of RTP extension headers.
WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, and WhatsApp Business for iOS prior to 2.18.100.2 are affected.
CVE-2018-6350 has a severity level of 9.8 (Critical).
Update WhatsApp to version 2.18.276 (Android) or 2.18.100.6 (iOS) to fix CVE-2018-6350 vulnerability.
You can find more information about CVE-2018-6350 on the following pages: [SecurityFocus](http://www.securityfocus.com/bid/108803) and [Facebook Security Advisories](https://www.facebook.com/security/advisories/cve-2018-6350/).