Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
5 minutes ago
Jennifer Lawrence: I felt really safe with Robert Pattinson
5 minutes ago
‘Manjummel Boys’ was more than just a project; it was a journey of friendship, trust, and sheer perseverance: Soubin Shahir
6 minutes ago
Prithviraj's 'Vilaayath Buddha' to hit screens worldwide on November 21
7 minutes ago
Anthony Hopkins says he ‘lost everything’ during California wildfires
7 minutes ago
Revathy shares glimpse of upcoming project with Parvathy Thiruvothu, Resul Pookutty
8 minutes ago
R. Madhavan on working with Ajay Devgn in ‘De De Pyaar De 2’: Felt valued and respected
8 minutes ago
Farah Khan reveals Kajol returned to film set just a month after giving birth
9 minutes ago
Shatrughan Sinha says he was fortunate to work and learn from Sanjeev Kumar
19 minutes ago
Upset Hindus urge Shein Group to apologize & withdraw Lord Ganesh doormat
20 minutes ago
President Droupadi Murmu hosts Women’s ODI WC-winning Indian team at Rashtrapati Bhavan
21 minutes ago
Heartbroken woman techie held for fake bomb threats to B'luru schools
22 minutes ago
Chhattisgarh: Kamala Sodi, woman Maoist with Rs 17 lakh bounty, surrenders
22 minutes ago
Bhagalpur’s Class 7 student prepares sketch of PM Modi for warm welcome
