A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://www.facebook.com/security/advisories/cve-2019-11932 | third party advisory |
http://packetstormsecurity.com/files/154867/Whatsapp-2.19.216-Remote-Code-Execution.html | vdb entry third party advisory |
https://github.com/koral--/android-gif-drawable/pull/673/commits/4944c92761e0a14f04868cbcf4f4e86fd4b7a4a9 | third party advisory |
https://github.com/koral--/android-gif-drawable/pull/673 | third party advisory |
https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ | third party advisory exploit |
http://seclists.org/fulldisclosure/2019/Nov/27 | third party advisory mailing list |
https://gist.github.com/wdormann/874198c1bd29c7dd2157d9fc1d858263 | third party advisory |
http://packetstormsecurity.com/files/158306/WhatsApp-android-gif-drawable-Double-Free.html | vdb entry third party advisory |
https://github.com/koral--/android-gif-drawable/commit/cc5b4f8e43463995a84efd594f89a21f906c2d20 | third party advisory patch |