Vulnerability CVE-2018-6350


Published: 2019-06-14

Description:
An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224.

Type:

CWE-125

(Out-of-bounds Read)

Vendor: Whatsapp
Product: Whatsapp 
Version:
2.8.7
2.8.6
2.8.4
2.8.3
2.8.2
2.8.1
2.6.9
2.6.7
2.6.6
2.6.5
2.6.4
2.6.10
2.2.5
2.18.93
2.17.7
2.17.5
2.17.4
2.17.3
2.17.2
2.17.1
2.16.9
2.16.8
2.16.7
2.16.6
2.16.5
2.16.4
2.16.3
2.16.20
2.16.2
2.16.19
2.16.18
2.16.17
2.16.16
2.16.15
2.16.14
2.16.13
2.16.12
2.16.11
2.16.10
2.16.1
2.12.9
2.12.8
2.12.7
2.12.6
2.12.4
2.12.3
2.12.2
2.12.17
2.12.16
2.12.15
2.12.14
2.12.13
2.12.12
2.12.11
2.12.10
2.12.1
2.11.9
2.11.8
2.11.7
2.11.6
2.11.5
2.11.4
2.11.3
2.11.16
2.11.15
2.11.14
2.11.12
2.11.11
2.10.2
2.10.1

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial

 References:
http://www.securityfocus.com/bid/108803
https://www.facebook.com/security/advisories/cve-2018-6350/

Related CVE
CVE-2019-11931
A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects And...
CVE-2019-11932
A double free vulnerability in the DDGifSlurp function in decoding.c in libpl_droidsonroids_gif before 1.2.15, as used in WhatsApp for Android before 2.19.244, allows remote attackers to execute arbitrary code or cause a denial of service.
CVE-2019-11927
An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for Android before version 2.19.143 and WhatsAp...
CVE-2018-20655
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
CVE-2019-3568
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android ...
CVE-2019-3566
A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previou...
CVE-2018-6344
A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.1...
CVE-2017-8769
** DISPUTED ** Facebook WhatsApp Messenger before 2.16.323 for Android uses the SD card for cleartext storage of files (Audio, Documents, Images, Video, and Voice Notes) associated with a chat, even after that chat is deleted. There may be users who ...

Copyright 2019, cxsecurity.com

 

Back to Top