WhatsApp announced more transparency about the vulnerabilities affecting its app and will publicly disclose them to the users.
The company addressed six previously undisclosed flaws in its app and disclosed them on a new dedicated web site.
Some of the vulnerabilities were reported through the Facebook bug-bounty program, while the others were discovered during code reviews.
Some of the vulnerabilities recently patched by WhatsApp could be exploited by remote attackers.
One of the flaws, tracked as CVE-2020-1894, is a stack write overflow that can have allowed arbitrary code execution when playing a specially crafted push to talk message. The vulnerability affects WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30.
Another flaw, tracked as CVE-2020-1891, is an out-of-bounds write on 32-bit devices. The bug affects WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20.
The third flaw, tracked as CVE-2020-1890, is an URL-validation issue that could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction. The vulnerability affects Android versions of WhatsApp and WhatsApp Business for Android
The remaining bugs are:
The company revealed that five of the six flaws recently disclosed have been patched immediately after their discovery.
The sixth flaw was addressed in a few days after its disclosure.
(SecurityAffairs – hacking, undisclosed flaws)