First published: Tue May 14 2019(Updated: )
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
Credit: cve-assign@fb.com cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.18.15 | |
Whatsapp Whatsapp | <2.18.348 | |
Whatsapp Whatsapp | <2.19.44 | |
Whatsapp Whatsapp | <2.19.51 | |
Whatsapp Whatsapp | <2.19.51 | |
Whatsapp Whatsapp | <2.19.134 | |
Meta Platforms WhatsApp | ||
<2.18.15 | ||
<2.18.348 | ||
<2.19.44 | ||
<2.19.51 | ||
<2.19.51 | ||
<2.19.134 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3568 is a buffer overflow vulnerability in WhatsApp VOIP stack that allows remote code execution.
The CVE-2019-3568 vulnerability can be exploited by sending a specially crafted series of RTCP packets to a target phone number in WhatsApp.
WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, and WhatsApp Business for iOS prior to v2.19.51 are all affected by CVE-2019-3568.
CVE-2019-3568 has a severity rating of 9.8, which is considered critical.
To fix CVE-2019-3568, users should update their WhatsApp to the latest version available for their respective platforms.