WhatsApp patches 6 security bugs, says it will disclose and patch issues “as quickly as possible”
Social media giant Facebook-owned WhatsApp has disclosed about the patched bugs that had concerns with the security. The company has disclosed 6 bugs on its new security advisory website with the CVE tracking names. The site is part of an effort by WhatsApp to be more transparent about platform vulnerabilities to not just users, but also the security community, and patch them in a timely manner.
We are very committed to transparency, and this resource is intended to help the broader technology community benefit from the latest advances in our security efforts.
Below is the information of the 6 bugs that are patched by the company with respect to security concerns:
A stack writes overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
A user-controlled parameter used in a video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.
A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
An input validation issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.
According to a media report, it was also known that some of the bugs were also discovered through the Facebook bug-bounty program, which is said to be also covering the WhatsApp issues. This transparency offered by the company was just after some hackers were found exploiting a zero-day vulnerability to install spyware on users’ smartphones.
For more news on tech and cybersecurity stay tuned on Android Rookies by following us on Google News.