Technology
New WhatsApp bug may steal files, messages with GIFs
San Francisco, Oct 3
A security bug has been found in Facebook-owned instant messenger WhatsApp that could let attackers to obtain access to a device and steal data by sending a malicious GIF file.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
The danger stems from a double-free bug in WhatsApp, according to a researcher going by the nickname Awakened, The Next Web reported on Wednesday.
A double-free vulnerability is a memory corruption anomaly that could crash an application or open up an exploit vector that attackers can abuse to gain access to users' device.
According to Awakened's post on GitHub, the flaw resided in WhatsApp's Gallery view implementation that is used to generate previews for photographs, videos and GIFs.
All it takes to perform the attack is to craft a malicious GIF, and wait for the user to open the WhatsApp gallery, the report added.
"The exploit works well until WhatsApp version 2.19.230. The vulnerability is officially patched in WhatsApp version 2.19.244," wrote the researcher.
The bug also works for Android 8.1 and Android 9.0 OS but does not work for Android 8.0 and below.
In the older Android versions, double-free could still be triggered. However, because of the malloc calls by the system after the double-free, the app just crashes before reaching to the point that we could control the PC register, according to a report in Gizmodo.
8 hours ago
AAPI Global Health Summit 2026 in Odisha Showcases Cutting‑Edge Resuscitation Training, AI‑Driven Clinical Education, and India’s National Emergency Life Support Program
8 hours ago
Inany conducts health fair in Staten Island
8 hours ago
EAM Jaishankar and visiting Greek defence minister discuss key strategic and security issues
8 hours ago
PM Modi very charismatic and phenomenal leader: Polish Secretary of State
8 hours ago
India–EU FTA ‘game-changing development’ in bilateral ties, says EAM Jaishankar
8 hours ago
Delighted to participate in the India-Seychelles Business Forum in Chennai today during the State Visit of H.E. Dr. Patrick Herminie, President of Seychelles.
13 hours ago
Sonam Kapoor says 'Fantastic dad' after witnessing Anil Kapoor's teaser poster for 'Subedaar'
13 hours ago
Shalmali Kholgade reveals how she flipped the narrative of love with her new song ‘Impression’
13 hours ago
Rohit Shetty firing case: IMPPA writes to CM Devendra Fadnavis requesting immediate intervention
13 hours ago
CM Omar Abdullah presents Rs 1,13,767 crore budget in J&K Assembly; focusing on investment, innovation
13 hours ago
Naveen Patnaik expresses concern over missing Odia merchant navy cadet, appeals for urgent action
13 hours ago
Oppn protests outside Bihar Legislative Council; Rabri Devi raises farmers' issues
14 hours ago
Search and rescue operation underway as tiger prowls near Rajahmundry in Andhra Pradesh
