Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
5 hours ago
IDFUSA ‘ORG (International Development Foundation) Annual Charity Event Highlights Compassion-Led Projects, Global Partnerships, and Scalable Social Impact
5 hours ago
“THE GREEN ALERT” Documentary Garners Global Attention for Urgent Environmental Message
5 hours ago
JSW Sports Signs U19 Women’s T20 World Cup Winning Captain Niki Prasad
5 hours ago
Trump claims progress in Iran talks, but Tehran stays silent
6 hours ago
Aditya Dhar’s ‘Dhurandhar-The Revenge’ rakes in whopping Rs. 1365 crore globally
6 hours ago
US to finish Iran fight in weeks: Marco Rubio
6 hours ago
Usha Vance launches kids’ reading podcast
7 hours ago
Trump warns Iran on Hormuz, power grid if deal is not reached
11 hours ago
Satheesan-Vijayan development debate challenge takes centre stage in poll-bound Kerala
11 hours ago
Rahul Gandhi opens Kerala campaign for Cong with sharp attack on LDF–BJP 'hidden pact'
12 hours ago
Bharath-starrer 'Kaalidas 2' cleared for release with U/A certificate
12 hours ago
Basil Joseph-starrer Raawadi's shooting wrapped up
12 hours ago
Farida Jalal brings back Rajesh Khanna-era nostalgia, recreates iconic 'Aradhana' song after 57 years
