Skip to main content
Just a GIF Image Could Have Hacked Your Android Phone Using WhatsApp
Just a GIF Image Could Have Hacked Your Android Phone Using WhatsApp

A picture is worth a thousand words, but a GIF is worth a thousand pictures.
Today, the short looping clips, GIFs are everywhere—on your social
media, on your message boards, on your chats, helping users perfectly
express their emotions, making people laugh, and reliving a highlight.
But what if an innocent-looking GIF greeting with Good morning, Happy
Birthday, or Merry Christmas message hacks your smartphone?
Well, not a theoretical idea anymore.
WhatsApp has recently patched a critical security vulnerability in its
app for Android, which remained unpatched for at least 3 months after
being discovered, and if exploited, could have allowed remote hackers to
compromise Android devices and potentially steal files and chat
messages.WhatsApp Remote Code Execution Vulnerability
The vulnerability, tracked as CVE-2019-11932, is a double-free
memory corruption bug that doesn't actually reside in the WhatsApp code
itself, but in an open-source GIF image parsing library that WhatsApp
uses

Discovered by Vietnamese security researcher Pham Hong Nhat
in May this year, the issue successfully leads to remote code execution
attacks, enabling attackers to execute arbitrary code on targeted
devices in the context of WhatsApp with the permissions the app has on
the device.
Comments
Post a Comment