CVE-2018-20655 is a vulnerability in WhatsApp
Published on June 14, 2019
When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2018-20655 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2018-20655
Want to know whenever a new CVE is published for WhatsApp? stack.watch will email you.
Affected Versions
Facebook WhatsApp for iOS:- Version 2.18.90.24 is affected.
- Version unspecified and below 2.18.90.24 is affected.
- Version 2.18.90.24 is affected.
- Version unspecified and below 2.18.90.24 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.