cve/2020/CVE-2020-1894.md

23 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-1894](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1894)
![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20Android&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20Business%20for%20Android&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20Business%20for%20iPhone&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WhatsApp%20iPhone&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%202.20.20%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%202.20.30%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=!%3D%3E%202.20.35%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Out-of-bounds%20Write%20(CWE-787)&color=brighgreen)
### Description
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/404notf0und/CVE-Flow