HomeWhatsappCVE-2019-11931

CVE-2019-11931

HIGH
7.8CVSS
Published: 2019-11-14
Updated: 2024-11-21
AI Analysis

Description

A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
local
Complexity
low
Privileges
none
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
high
Weaknesses
CWE-121CWE-787

Metadata

Primary Vendor
WHATSAPP
Published
11/14/2019
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

whatsapp : whatsappwhatsapp : whatsappwhatsapp : whatsappwhatsapp : whatsapp_businesswhatsapp : whatsapp_businesswhatsapp : whatsapp_enterprise_client

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2019-11931 | HIGH Severity | CVEDatabase.com | CVEDatabase.com