android-gif-drawableproject android-gif-drawable CVE-2019-11932 in Android Gif Drawableproject and WhatsApp Products
Published on October 3, 2019

product logo product logo
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.

NVD

Weakness Type

What is a Double-free Vulnerability?

The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations. When a program calls free() twice with the same argument, the program's memory management data structures become corrupted. This corruption can cause the program to crash or, in some circumstances, cause two later calls to malloc() to return the same pointer. If malloc() returns the same value twice and the program later gives the attacker control over the data that is written into this doubly-allocated memory, the program becomes vulnerable to a buffer overflow attack.

CVE-2019-11932 has been classified to as a Double-free vulnerability or weakness.


Products Associated with CVE-2019-11932

stack.watch emails you whenever new vulnerabilities are published in Android Gif Drawableproject Android Gif Drawable or WhatsApp. Just hit a watch button to start following.

 
 

Affected Versions

koral-- android-gif-drawable:

Exploit Probability

EPSS
70.49%
Percentile
98.68%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.