First published: Thu Oct 03 2019(Updated: )
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.19.244 | |
Android-gif-drawable Project Android-gif-drawable | <1.2.18 |
https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11932 is a double free vulnerability in the DDGifSlurp function in the android-gif-drawable library before version 1.2.18, allowing remote attackers to execute arbitrary code or cause a denial of service.
WhatsApp for Android versions up to 2.19.244 and other Android applications using the android-gif-drawable library versions up to 1.2.18 are affected by CVE-2019-11932.
CVE-2019-11932 has a severity score of 8.8 (high).
CVE-2019-11932 can be exploited by remote attackers to execute arbitrary code or cause a denial of service.
Yes, updating to android-gif-drawable library version 1.2.18 or above and WhatsApp for Android version 2.19.244 or above will fix CVE-2019-11932.