First published: Thu Nov 14 2019(Updated: )
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <=2.18.368 | |
Whatsapp Whatsapp | <2.19.100 | |
Whatsapp Whatsapp | <2.19.274 | |
Whatsapp Whatsapp Business | <2.19.100 | |
Whatsapp Whatsapp Business | <2.19.104 | |
Whatsapp Whatsapp Enterprise Client | <2.25.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11931 is a vulnerability in WhatsApp that allows a stack-based buffer overflow by sending a specially crafted MP4 file, potentially leading to a Denial of Service (DoS) or Remote Code Execution (RCE).
WhatsApp versions prior to 2.19.274 for Android, prior to 2.19.100 for iOS, and prior to 2.19.104 for WhatsApp Business on Android and WhatsApp Business on iOS are affected by CVE-2019-11931.
CVE-2019-11931 has a severity score of 7.8 (high).
To fix CVE-2019-11931, update WhatsApp to version 2.19.274 for Android, 2.19.100 for iOS, 2.19.104 for WhatsApp Business on Android, or 2.19.100 for WhatsApp Business on iOS.
You can find more information about CVE-2019-11931 on the official Facebook Security Advisories page: https://www.facebook.com/security/advisories/cve-2019-11931