Passer au contenu
  • Accueil
  • Applications
    • AppelsMessagerieGroupesStatutChaînesMeta AISécurité
  • Confidentialité
  • Pages d’aide
  • Blog
  • Pour les entreprises
Télécharger
Conditions générales et politique de confidentialité2025 © WhatsApp LLC
Page principale de WhatsAppPage principale de WhatsApp
    • Appels

      Restez en contact grâce aux appels vocaux et vidéo.

    • Messagerie

      Utilisez des stickers, des messages vocaux, des GIF et plus encore.

    • Groupes

      Les fonctionnalités de messagerie dont vous avez besoin pour communiquer dans les groupes.

    • Chaînes

      Recevez des actus sur les sujets qui vous intéressent.

    • Meta AI

      Obtenez de l’aide pour toutes sortes de choses en toute sécurité et en préservant votre confidentialité sur WhatsApp.

    • Statut

      Partagez votre quotidien avec des photos, des vidéos et des notes vocales.

    • Sécurité

      Plusieurs niveaux de protection pour assurer votre sécurité.

  • Confidentialité
  • Pages d’aide
  • Blog
  • Pour les entreprises
  • Applications
Se connecterTélécharger

WhatsApp Security Advisories

Archive

CVE-2019-18426

A vulnerability in WhatsApp Desktop when paired with WhatsApp for iPhone allows cross-site scripting and local file reading. Exploiting the vulnerability requires the victim to click a link preview from a specially crafted text message. WhatsApp Desktop prior to v0.3.9309 paired with WhatsApp for iPhone versions prior to 2.20.10 are affected.

CVE-2019-11933

A heap buffer overflow bug in libpl_droidsonroids_gif before 1.2.19, as used in WhatsApp for Android before version 2.19.291 could allow remote attackers to execute arbitrary code or cause a denial of service.

CVE-2019-11932

A double free vulnerability in the DDGifSlurp function in decoding.c in libpl_droidsonroids_gif before 1.2.15, as used in WhatsApp for Android before 2.19.244, allows remote attackers to execute arbitrary code or cause a denial of service.

CVE-2019-11931

A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Windows Phone versions before and including 2.18.368, Business for Android versions prior to 2.19.104, and Business for iOS versions prior to 2.19.100.

CVE-2019-11927

An integer overflow in WhatsApp media parsing libraries allows a remote attacker to perform an out-of-bounds write on the heap via specially-crafted EXIF tags in WEBP images. This issue affects WhatsApp for iOS before version v2.19.100 and WhatsApp for Android before version 2.19.243.

CVE-2019-3571

An input validation issue affected WhatsApp Desktop versions prior to 0.3.3793 which allows malicious clients to send files to users that would be displayed with a wrong extension.

CVE-2019-3568

A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number. The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.

CVE-2019-3566

A bug in WhatsApp for Android's messaging logic would potentially allow a malicious individual who has taken over over a WhatsApp user's account to recover previously sent messages. This behavior requires independent knowledge of metadata for previous messages, which are not available publicly. This issue affects WhatsApp for Android 2.19.52 and 2.19.54 - 2.19.103, as well as WhatsApp Business for Android starting in v2.19.22 until v2.19.38.

CVE-2018-20655

When receiving calls using WhatsApp for iOS, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for iOS prior to v2.18.90.24 and WhatsApp Business for iOS prior to v2.18.90.24.

CVE-2018-6350

An out-of-bounds read was possible in WhatsApp due to incorrect parsing of RTP extension headers. This issue affects WhatsApp for Android prior to 2.18.276, WhatsApp Business for Android prior to 2.18.99, WhatsApp for iOS prior to 2.18.100.6, WhatsApp Business for iOS prior to 2.18.100.2, and WhatsApp for Windows Phone prior to 2.18.224.

CVE-2018-6349

When receiving calls using WhatsApp for Android, a missing size check when parsing a sender-provided packet allowed for a stack-based overflow. This issue affects WhatsApp for Android prior to 2.18.248 and WhatsApp Business for Android prior to 2.18.132.

CVE-2018-6344

A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172.

CVE-2018-6339

When receiving calls using WhatsApp on Android, a stack allocation failed to properly account for the amount of data being passed in. An off-by-one error meant that data was written beyond the allocated space on the stack. This issue affects WhatsApp for Android starting in version 2.18.180 and was fixed in version 2.18.295. It also affects WhatsApp Business for Android starting in version v2.18.103 and was fixed in version v2.18.150.

Télécharger
Logo principal de WhatsApp
Logo principal de WhatsApp
Télécharger
Notre mission
FonctionnalitésBlogSécuritéPour les entreprises
Qui sommes-nous ?
À propos de nousEmploisEspace MarqueConfidentialité
Utiliser WhatsApp
AndroidiPhoneMac/PCWhatsApp Web
Besoin d’aide ?
Nous contacterCentre d’aideApplicationsAvis de sécurité
Télécharger

2025 © WhatsApp LLC

Conditions et politique de confidentialitéPlan du site