Description
A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-12733 | A stack overflow in WhatsApp for Android prior to v2.20.196.16, WhatsApp Business for Android prior to v2.20.196.12, WhatsApp for iOS prior to v2.20.90, WhatsApp Business for iOS prior to v2.20.90, and WhatsApp for Portal prior to v173.0.0.29.505 could have allowed arbitrary code execution when parsing the contents of an RTP Extension header. |
References
| Link | Providers |
|---|---|
| https://www.whatsapp.com/security/advisories/2020/ |
|
History
No history.
Status: PUBLISHED
Assigner: facebook
Published:
Updated: 2024-08-04T06:53:59.972Z
Reserved: 2019-12-02T00:00:00.000Z
Link: CVE-2020-1907
No data.
Status : Modified
Published: 2020-10-06T18:15:17.187
Modified: 2024-11-21T05:11:35.333
Link: CVE-2020-1907
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD