Vulnerability Description
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| < 2.18.90.24 | ||
| Whatsapp Business | < 2.18.90.24 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/108805Third Party AdvisoryVDB Entry
- https://www.facebook.com/security/advisories/cve-2018-20655/Third Party Advisory
- http://www.securityfocus.com/bid/108805Third Party AdvisoryVDB Entry
- https://www.facebook.com/security/advisories/cve-2018-20655/Third Party Advisory
FAQ
What is CVE-2018-20655?
CVE-2018-20655 is a vulnerability with a CVSS score of 9.8 (CRITICAL). When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and...
How severe is CVE-2018-20655?
CVE-2018-20655 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-20655?
Check the references section above for vendor advisories and patch information. Affected products include: Whatsapp Whatsapp, Whatsapp Whatsapp Business.