CVE-2019-3568

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
References
Link Resource
http://www.securityfocus.com/bid/108329 Broken Link Third Party Advisory VDB Entry
https://www.facebook.com/security/advisories/cve-2019-3568 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:tizen:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows_phone:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:android:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:business:iphone_os:*:*
cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*

History

02 Jul 2024, 17:01

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/108329 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108329 - Broken Link, Third Party Advisory, VDB Entry

Information

Published : 2019-05-14 20:29

Updated : 2024-07-02 17:01


NVD link : CVE-2019-3568

Mitre link : CVE-2019-3568

CVE.ORG link : CVE-2019-3568


JSON object : View

Products Affected

whatsapp

  • whatsapp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow