whatsapp whatsapp CVE-2019-11931 vulnerability in WhatsApp Products
Published on November 14, 2019

A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.

NVD

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2019-11931 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2019-11931

Want to know whenever a new CVE is published for WhatsApp products? stack.watch will email you.

 
 
 

Affected Versions

Facebook WhatsApp for Android: Facebook WhatsApp for iOS: Facebook WhatsApp for Windows Phone: Facebook WhatsApp Enterprise Client: Facebook WhatsApp Business for Android: Facebook WhatsApp Business for iOS:

Exploit Probability

EPSS
0.49%
Percentile
65.71%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.