This vulnerability allows remote attackers to execute arbitrary code on affected installations of Tencent WeChat. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the WXAM Decoder. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process.
Affected Software | Affected Version | How to fix |
---|---|---|
Tencent Wechat |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-11580 has been classified as a critical vulnerability due to its remote code execution potential.
To mitigate ZDI-CAN-11580, users should update Tencent WeChat to the latest version provided by the vendor.
The primary risk of ZDI-CAN-11580 is that remote attackers can execute arbitrary code on affected WeChat installations.
Any user of Tencent WeChat who interacts with malicious pages or files is at risk of exploitation through ZDI-CAN-11580.
Yes, user interaction is required as the target must visit a malicious page or open a malicious file for ZDI-CAN-11580 to be exploited.