cve-2020-1909
Vulnerability from cvelistv5
Published
2020-11-03 19:15
Modified
2024-08-04 06:53
Severity ?
EPSS score ?
Summary
A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.
References
▼ | URL | Tags | |
---|---|---|---|
cve-assign@fb.com | https://www.whatsapp.com/security/advisories/2020/ | Vendor Advisory |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | WhatsApp Business for iOS |
Version: 2.20.111 Version: unspecified < 2.20.111 Version: 2.20.81 < unspecified |
|||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:53:59.797Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "WhatsApp Business for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.111" }, { "lessThan": "2.20.111", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "2.20.81", "versionType": "custom" } ] }, { "product": "WhatsApp for iOS", "vendor": "Facebook", "versions": [ { "status": "affected", "version": "2.20.111" }, { "lessThan": "2.20.111", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "lessThan": "unspecified", "status": "affected", "version": "2.20.81", "versionType": "custom" } ] } ], "dateAssigned": "2020-11-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-03T19:15:17", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.whatsapp.com/security/advisories/2020/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-11-03", "ID": "CVE-2020-1909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "WhatsApp Business for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.111" }, { "version_affected": "\u003c", "version_value": "2.20.111" }, { "version_affected": "\u003e=", "version_value": "2.20.81" } ] } }, { "product_name": "WhatsApp for iOS", "version": { "version_data": [ { "version_affected": "!=\u003e", "version_value": "2.20.111" }, { "version_affected": "\u003c", "version_value": "2.20.111" }, { "version_affected": "\u003e=", "version_value": "2.20.81" } ] } } ] }, "vendor_name": "Facebook" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.whatsapp.com/security/advisories/2020/", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020/" } ] } } } }, "cveMetadata": { "assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1909", "datePublished": "2020-11-03T19:15:17", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2020-1909\",\"sourceIdentifier\":\"cve-assign@fb.com\",\"published\":\"2020-11-03T20:15:12.470\",\"lastModified\":\"2020-11-06T19:24:58.863\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use-after-free in a logging library in WhatsApp for iOS prior to v2.20.111 and WhatsApp Business for iOS prior to v2.20.111 could have resulted in memory corruption, crashes and potentially code execution. This could have happened only if several events occurred together in sequence, including receiving an animated sticker while placing a WhatsApp video call on hold.\"},{\"lang\":\"es\",\"value\":\"Un uso de la memoria previamente liberada en una biblioteca de registro en WhatsApp para iOS anterior a versi\u00f3n v2.20.111 y WhatsApp Business para iOS anterior a versi\u00f3n v2.20.111, podr\u00eda haber resultado en una corrupci\u00f3n de la memoria, fallos y potencialmente una ejecuci\u00f3n de c\u00f3digo.\u0026#xa0;Esto podr\u00eda haber sucedido solo si varios eventos ocurrieron juntos en secuencia, incluyendo la recepci\u00f3n de una pegatina animada mientras se coloca una videollamada de WhatsApp en espera\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":7.5},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]},{\"source\":\"cve-assign@fb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"2.20.111\",\"matchCriteriaId\":\"94A5904E-1921-4B50-93DD-1D82CBC1DF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*\",\"versionEndExcluding\":\"2.20.111\",\"matchCriteriaId\":\"1B569A24-2305-4924-9AB7-2EB6F1B27685\"}]}]}],\"references\":[{\"url\":\"https://www.whatsapp.com/security/advisories/2020/\",\"source\":\"cve-assign@fb.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.