CVE-2018-6349 is a vulnerability in WhatsApp
Published on June 14, 2019
When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2018-6349 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2018-6349
Want to know whenever a new CVE is published for WhatsApp? stack.watch will email you.
Affected Versions
Facebook WhatsApp for Android:- Version 2.18.248 is affected.
- Version unspecified and below 2.18.248 is affected.
- Version 2.18.132 is affected.
- Version unspecified and below 2.18.132 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.