![]() However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register," the researcher writes. "In the older Android versions, double-free could still be triggered. ![]() ![]() The issue affects WhatsApp versions 2.19.230 and older versions running on Android 8.1 and 9.0, but does not work for Android 8.0 and below. Vulnerable Apps, Devices and Available Patches Thus, to be noted, the vulnerability does not get triggered by sending a malicious GIF file to a victim instead it gets executed when the victim itself simply opens the WhatsApp Gallery Picker while trying to send any media file to someone.Īs shown in a proof-of-concept video demonstration the researcher shared with The Hacker News, the vulnerability can also be exploited to simply pop-up a reverse shell remotely from the hacked device. WhatsApp uses the parsing library in question to generate a preview for GIF files when users open their device gallery before sending any media file to their friends or family. How Does WhatsApp RCE Vulnerability Work? "Malicious code will have all the permissions that WhatsApp has, including recording audio, accessing the camera, accessing the file system, as well as WhatsApp's sandbox storage that includes protected chat database and so on…" Therefore it has the permission to read the SDCard and access the WhatsApp message database," the researcher told The Hacker News in an email interview. "The payload is executed under WhatsApp context. ![]() ![]() Discovered by Vietnamese security researcher Pham Hong Nhat in May this year, the issue successfully leads to remote code execution attacks, enabling attackers to execute arbitrary code on targeted devices in the context of WhatsApp with the permissions the app has on the device. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |