All the vulnerabilites related to Facebook - WhatsApp Android
cve-2020-1891
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
References
▼ | URL | Tags |
---|---|---|
https://www.whatsapp.com/security/advisories/2020 | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.17" }, { "lessThan": "2.20.17", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.7" }, { "lessThan": "2.20.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1891", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.17" }, { "version_affected": "\u003c", "version_value": "2.20.17" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.7" }, { "version_affected": "\u003c", "version_value": "2.20.7" } ] } }, { "product_name": "WhatsApp iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } }, { "product_name": "WhatsApp Business for iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1891", "datePublished": "2020-09-03T21:10:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1894
Vulnerability from cvelistv5
Published
2020-09-03 21:10
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
References
▼ | URL | Tags |
---|---|---|
https://www.whatsapp.com/security/advisories/2020 | x_refsource_CONFIRM |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.35" }, { "lessThan": "2.20.35", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.20" }, { "lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.30" }, { "lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "WhatsApp Business for iPhone", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.30" }, { "lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-03T21:10:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.35" }, { "version_affected": "\u003c", "version_value": "2.20.35" } ] } }, { "product_name": "WhatsApp Business for Android", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.20" }, { "version_affected": "\u003c", "version_value": "2.20.20" } ] } }, { "product_name": "WhatsApp iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.30" }, { "version_affected": "\u003c", "version_value": "2.20.30" } ] } }, { "product_name": "WhatsApp Business for iPhone", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.30" }, { "version_affected": "\u003c", "version_value": "2.20.30" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write (CWE-787)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1894", "datePublished": "2020-09-03T21:10:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }