First published: Thu Sep 03 2020(Updated: )
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.20.11 | |
Whatsapp Whatsapp Business | <2.20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2020-1886.
The severity of CVE-2020-1886 is high.
WhatsApp for Android versions prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 are affected by CVE-2020-1886.
This vulnerability can be exploited by a specially crafted video stream after receiving and answering a malicious video call.
Yes, updating WhatsApp for Android to v2.20.11 and WhatsApp Business for Android to v2.20.2 or later versions fixes CVE-2020-1886.