Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
4 hours ago
If the PAN card is not provided, the bank account will be blocked within 24 hours; clicking on the links will lead to trouble
4 hours ago
Israeli PM's office denies reports of Hamas approval for ceasefire deal
5 hours ago
Gopan Swami's tomb will be exhumed and examined tomorrow; the district administration has informed the decision.
7 hours ago
Canadian Minister Francois Champagne steps back from Liberal Party leadership race
8 hours ago
US: Michelle Obama to not attend swearing-in ceremony of Donald Trump
8 hours ago
Biden administration to remove Cuba from US terrorism list
8 hours ago
US Congressman Krishnamoorthi leads resolution for Tamil Language and Heritage Month
9 hours ago
'Will collaborate with US State & Commerce Depts to reassess India-US ties': Pete Hegseth
9 hours ago
Joe Biden announces measures to protect US connected vehicle supply chains from China, Russia
11 hours ago
Jackky Bhagnani: I've always enjoyed playing cricket
11 hours ago
Here’s why Bobby Deol chose ‘Daaku Maharaaj’
11 hours ago
Urvashi Rautela: Dance with Nandamuri Balakrishna was not just a performance for me
11 hours ago
M. Night Shyamalan faces $81 million copyright trial over OTT show ‘Servant’