From 1c7d9917bbd2d0c784f12041dde450a9f93e2b85 Mon Sep 17 00:00:00 2001 From: Gulshan Singh Date: Tue, 13 Aug 2019 16:30:33 -0400 Subject: [PATCH] Change SRTCP to RTCP in CVE-2019-3568 --- 2019/3xxx/CVE-2019-3568.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2019/3xxx/CVE-2019-3568.json b/2019/3xxx/CVE-2019-3568.json index 651ed97b948..2fce698c392 100644 --- a/2019/3xxx/CVE-2019-3568.json +++ b/2019/3xxx/CVE-2019-3568.json @@ -150,7 +150,7 @@ "description_data": [ { "lang": "eng", - "value": "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." + "value": "A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15." } ] }, @@ -180,4 +180,4 @@ } ] } -} \ No newline at end of file +}