PSA: Update Whats-App these days into prevent spyware From being installed at Your phone #Buffer_OverflowMay 16, 2019
WhatsApp, the messaging app used by more than 1.5 billion worldwide, says it’s patched a critical security vulnerability which allowed attackers to secretly infect phones with malicious spyware by just calling phone numbers over an in-app audio call.
CVE-2019-3568 , as the vulnerability has been documented, was discovered early this month, according to The Financial Times .
The FT, citing an unnamed “spyware technology dealer”, also said the “actor” was the Israeli company NSO Group, known for working with governments to install spyware.
“It is an unprecedented security flaw in terms of its potential to run high-profile targeted attacks.
The ability to track the victim in real time, to listen to a device’s microphone and read instant communications are all a golden-mine for cybercriminals,” said Ilia Kolochenko, Founder, CEO and Chief Architect at web security company ImmuniWeb Inc.
So, the fact that malicious code could be injected by leveraging a buffer overflow vulnerability is a cause for serious concern.
A buffer overflow typically occurs when more data than the buffer can hold is written.
This causes the buffer to write the excess data to the adjacent memory location.
Attackers can exploit this bug by injecting code that’s meant to cause a buffer overflow, then writing the rest of the data to the memory address adjacent to the overflowing buffer.
The overflow data might also contain malicious executable code that allows nefarious actors to run more sophisticated programs or grant themselves access to the system.