Skip to main content

WhatsApp Discloses 6 Bugs That Allows Attackers to Execute Code Remotely

WhatsApp disclosed 6 security bugs through their dedicated security advisory site that allows attackers to execute remote code.



WhatsApp is a messaging app used by more than two billion users around the world. All the vulnerabilities are disclosed in dedicated security advisory site aimed to provide more transparent details about vulnerabilities for users and security professionals.


“We take the security of our users very seriously and we provide industry-leading protection for our users around the world. Our security team at WhatsApp works with experts around the world to stay ahead of potential threats,” reads the blog post.


6 Security WhatsApp Bugs

CVE-2020-1894 – A stack write overflow Bug in WhatsApp Business for Android

CVE-2020-1891 -A user controlled parameter used in video call in WhatsApp for Android

CVE-2020-1890 – A URL validation issue in WhatsApp for Android

CVE-2020-1889 – security feature bypass issue in WhatsApp Desktop versions

CVE-2020-1886 – A buffer overflow in WhatsApp for Android

CVE-2019-11928 -An input validation issue in WhatsApp Desktop versions

CVE-2020-1894


A stack write overflow which allows attackers to execute arbitrary code when playing a specially crafted push to talk message.


It affects WhatsApp for Android before v2.20.35, WhatsApp Business for Android before v2.20.20, WhatsApp for iPhone before v2.20.30, and WhatsApp Business for iPhone before v2.20.30.


CVE-2020-1891


A user-controlled parameter used in a video call in WhatsApp allowed an out-of-bounds write on 32-bit devices.


The bug affects WhatsApp for Android before v2.20.17, WhatsApp Business for Android before v2.20.7, WhatsApp for iPhone before v2.20.20, and WhatsApp Business for iPhone before v2.20.20.


CVE-2020-1890


A URL validation issue in WhatsApp for Android before v2.20.11 and WhatsApp Business for Android before v2.20.2 would allow the execution of malformed data in a sticker message that loads images from URL controlled by the sender.


CVE-2020-1889


A security feature bypass issue in WhatsApp Desktop versions before v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.


CVE-2020-1886


A buffer overflow in WhatsApp for Android before v2.20.11 and WhatsApp Business for Android before v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.


CVE-2019-11928


An input validation issue in WhatsApp Desktop versions before v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.

Comments

Post a Comment

Most Popular Cyber News

Google Task Mate 100% Working Invitation Referral Code – Activate Task Mate Account (Easy Steps)

  Valid and 100% Working Referral Code for Google Task Mate (Beta) Early Access/ Testers : Google India has Launched Task Mate App on 19 November 2020 for the Indian user where you can Earn Money by finding task nearby, complete task i.e. Photo Upload, Record Sentence, Translate Sentences, Check shop details, upload video, etc. As the Task Mate is available to users in Beta Early Access only and for that, you have to enter a valid Invitation Referral Code. Here, Our Website Group (WhatsApp, Telegram and Twitter) Group and Channel are providing valid Referral Codes. Task Mate Beta is currently only available through invitation. Please enter the invitation or referral code below. TaskMate App – Complete Task to Earn Money Article About Valid Invitation Code of Task Mate (Referral Code) Company Google India App Task Mate (Early Access) Version Beta (Early Access) Invitation/ Referral Code Required Validity of Code Only for 100 Users per Invitation Code Website http://www.google.com/ V...

Microsoft’s Windows XP operating system (and other versions) source code has been leaked online

  The source code for Microsoft’s Windows XP operating system (and other versions) has been leaked online!  Published as a torrent file on bulletin board website 4chan, the 43GB data dump is said to have been compiled over the course of the last few months by the leaker. The collection also includes source code for Windows 2000 and multiple versions of Windows CE, MS DOS, Windows Embedded and Windows NT - but all of which have a smaller modern install base than XP. The individual responsible for the leak also appears to bear Bill Gates a distinct grudge, dedicating a whole section of the torrent file to videos slandering the Microsoft founder.  The legitimacy of the leaked code has not yet been confirmed, but Microsoft has been made aware of the issue. Although support for Windows XP lapsed in 2014 - meaning the OS has not received security updates for a number of years - a surprising number of users remain loyal to the outdated operating system. As of last month, 1.26% o...

Pakistan news channel Dawn hacked, screen shows Indian tricolour, Happy Independence Day message

The 'Happy Independence Day' message was shown on the channel in Pakistan around 3:30 pm. A leading Pakistan TV news channel, Dawn, has reportedly been hacked, several photos and videos surfacing online showed. While an advertisement was running on the news channel, the Indian flag appeared over it with a message saying 'Happy Independence Day'. This was spotted by many Twitter users. The message was shown on the channel in Pakistan around 3:30 pm. News Jockey @jockey_news Dawn news channels of Pakistan hacked by Hackers https:// twitter.com/doctoralihamid /status/1289884543084834816/video/1 … 6:46 PM · Aug 2, 2020 56 22 people are Tweeting about  Meanwhile, Dawn News put out a tweet in Urdu saying "The Dawn administration has ordered an immediate investigation into the matter." Issuing a statement, Dawn News said that it was broadcasting as usual when the Indian tricolour and the Independence Day wish appeared over the commercial suddenly, remained on the sc...