Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.

4 hours ago
Sewa International’s Green Summit: Action for a Sustainable Future

6 hours ago
Trump 2.0: The First 100 Days That Are Shaping America Again

6 hours ago
Aamir Khan shares how being thrown out of a play led him to his first film role

6 hours ago
May 7 Conclave set to navigate ideological currents within Catholicism, fractured and polarized world

8 hours ago
'I'm very grateful for it,' American author Stephen Knapp on winning Padma Shri

8 hours ago
Trump Jr arrives in Seoul to meet biz leaders amid tariff concerns

8 hours ago
PM Modi congratulates Carney on election win, says looking forward to strengthen India-Canada partnership together

8 hours ago
Canada elections: Liberal Party to retain power after unintended boost from Trump

8 hours ago
Indian Overseas Congress USA Hosts 'Stand in Solidarity with India' Gathering at Times Square Following Pahalgam Terror Attack

11 hours ago
Kamya Panjabi on Akshay Tritiya: I don't limit new beginnings to a particular date

11 hours ago
Tisca Chopra recalls 'Ek Shaam Ki Mulaqaat' with Irrfan Khan on his death anniversary

11 hours ago
Soha Ali Khan reveals a fascinating story about her mother Sharmila Tagore's words of wisdom

11 hours ago
Devoleena reveals true face of Kashmiriyat, shares how some people in Kashmir harbor hatred for India