Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.

1 hour ago
Hamas submits "positive response" to US-backed Gaza ceasefire deal

1 hour ago
Trump announces plans to host UFC fight at White House for nation's 250th year of independence

1 hour ago
24 die in Texas floods, Trump calls inundation 'terrible'

1 hour ago
Musk threatens Republicans over Trump's 'big, beautiful bill', sparks internal rift

1 hour ago
Trump's 'One Big Beautiful' Tax and Spending Law: A New Era of Economic Redesign

2 hours ago
Ryo Tatsuki's tsunami prediction shook Japan; a heavy blow to the tourism sector; loss estimated at ₹30,000 crore.

5 hours ago
Release of Anushka Shetty, Vikram Prabhu-starrer 'Ghaati' postponed

5 hours ago
Goldmine: Sanju Rathod of ‘Gulabi Sadi’ fame says, there’s a lot to explore in Marathi music

5 hours ago
Makers of Prabhas's The Raja Saab condole demise of Hollywood star Michael Madsen

5 hours ago
Niharika Chouksey calls his Tum Se Tum Tak co-star Sharad Kelkar 'a very good human being'

5 hours ago
Jackie Shroff joins the plantation drive at the Lonikand Biodiversity Park

5 hours ago
Manushi Chhillar speaks on beauty treatment of actresses amid Shefali Jariwala's anti-aging pills debate

5 hours ago
Congress should have initiated organisational reforms earlier: Raj Babbar