First published: Tue Oct 06 2020(Updated: )
A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Whatsapp Whatsapp | <2.20.90 | |
Whatsapp Whatsapp | <2.20.196.16 | |
Whatsapp Whatsapp | <173.0.0.29.505 | |
Whatsapp Whatsapp Business | <2.20.90 | |
Whatsapp Whatsapp Business | <2.20.196.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1907 refers to a stack overflow vulnerability in WhatsApp for Android, WhatsApp Business for Android, WhatsApp for iOS, WhatsApp Business for iOS, and WhatsApp for Portal.
CVE-2020-1907 has a severity rating of 9.8 out of 10, which is classified as critical.
CVE-2020-1907 allows arbitrary code execution by exploiting a stack overflow vulnerability in the affected WhatsApp versions.
WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 are affected by CVE-2020-1907.
To fix CVE-2020-1907, update WhatsApp to version v2.20.196.16 or later for Android, v2.20.90 or later for iOS, v2.20.196.12 or later for WhatsApp Business for Android, v2.20.90 or later for WhatsApp Business for iOS, and v173.0.0.29.505 or later for WhatsApp for Portal.