CVE-2018-20655Stack-based Buffer Overflow in Whatsapp Business FOR IOS

Severity
9.8CRITICALNVD
EPSS
1.3%
top 20.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14
Latest updateMay 24

Description

When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

NVDwhatsapp/whatsapp_business< 2.18.90.24
CVEListV5facebook/whatsapp_business_for_iosunspecified2.18.90.24+1
NVDwhatsapp/whatsapp< 2.18.90.24
CVEListV5facebook/whatsapp_for_iosunspecified2.18.90.24+1

🔴Vulnerability Details

2
GHSA
GHSA-99ph-jqg7-g9v9: When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow2022-05-24
CVEList
CVE-2018-20655: When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow2019-06-14
CVE-2018-20655 — Stack-based Buffer Overflow | cvebase