CVE-2018-6349Stack-based Buffer Overflow in Whatsapp Business FOR Android

Severity
9.8CRITICALNVD
EPSS
1.3%
top 20.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14
Latest updateMay 24

Description

When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages4 packages

CVEListV5facebook/whatsapp_business_for_androidunspecified2.18.132+1
CVEListV5facebook/whatsapp_for_androidunspecified2.18.248+1
NVDwhatsapp/whatsapp< 2.18.248

🔴Vulnerability Details

2
GHSA
GHSA-57mf-q34v-cf2p: When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow2022-05-24
CVEList
CVE-2018-6349: When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow2019-06-14
CVE-2018-6349 — Stack-based Buffer Overflow | cvebase