Hacking threat via MP4 file, upgrade WhatsApp to latest version: Central agency


Team Udayavani, Nov 20, 2019, 5:15 PM IST

New Delhi: An Indian cybersecurity agency has warned WhatsApp users against a “vulnerability” that can attack this popular social media messaging app and compromise an individual system without seeking permissions.

The Computer Emergency Response Team-India (CERT-In) has issued an advisory in this context calling the severity of the threat, being spread by an MP4 file, as “high.” The advisory comes in the backdrop of recent developments where WhatsApp had informed the Indian government in September that over hundred Indian users were targeted by the Israeli spyware Pegasus. “A vulnerability has been reported in WhatsApp which could be exploited by a remote attacker to execute arbitrary code on the target system,” the latest advisory said.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian internet domain.

The agency’s advisory suggested “upgrading” to the latest version of WhatsApp to combat or tide over the problem.

Describing the malicious action of the vulnerability in the popular social messaging app (application), it said, “A stack-based buffer overflow vulnerability exists in WhatsApp due to improper parsing of elementary stream metadata of an MP4 file. A remote attacker could exploit this vulnerability by sending a specially crafted MP4 file to the target system.” It added that this could trigger a buffer overflow condition leading to execution of arbitrary code by the attacker. “The exploitation does not require any form of authentication from the victim end and executes on downloading of malicious crafted mp4 file on victim’s system,” it said.

Successful exploitation of this vulnerability, it said, could allow the remote attacker to cause remote code execution (RCE) or denial of service (DoS) condition, which could lead to further compromise of the system.

It stated half-a-dozen WhatsApp software have been “affected” by the current vulnerability.

They have been identified as WhatsApp for Android prior to 2.19.274, WhatsApp for iOS prior to 2.19.100, WhatsApp Enterprise Client prior to 2.25.3, WhatsApp for Windows Phone prior to 2.18.368, WhatsApp Business for Android prior to 2.19.104 and WhatsApp Business for iOS prior to 2.19.100.

Udayavani is now on Telegram. Click here to join our channel and stay updated with the latest news.

Top News

Actress Kasthuri released from jail, says ‘I thank those who made me raging storm’

Kidnapped for ransom in 1998, 26/11 survivor Gautam Adani faces biggest trial

100 engineering colleges in Karnataka to be ‘adopted’ by corporates by next year: IT Minister Kharge

Siddaramaiah defends BPL ration card cancellation, says only ineligible beneficiaries affected

China announces new policy measures to protect its exports from Trump’s new tariff threat

Renovated Medical Oncology OPD and Chemotherapy Day Care Centre inaugurated at Kasturba Hospital, Manipal

Karnataka Health Minister justifies revision of user fees in state-run hospitals

Related Articles More

Actress Kasthuri released from jail, says ‘I thank those who made me raging storm’

Kerala HC quashes FIR against Goa Guv over remarks on Sabarimala women entry

Smriti Irani embarks on four-nation tour to promote book on PM Modi

Karnataka Milk Federation enters Delhi-NCR, offers competitive pricing on Nandini products

Rahul, Congress tried since 2002 to target Modi’s image, PM’s credibility remains high: BJP

MUST WATCH

Christmas Cake Fruit Mixing

DK Shivakumar

Rose Cultivation

Geethotsava

Naxal Operation


Latest Additions

Siddaramaiah says confident of winning all three bypolls in Karnataka

Hop on! IT Minister Priyank Kharge checks out Uber Shuttle at Bengaluru Tech Summit

Actress Kasthuri released from jail, says ‘I thank those who made me raging storm’

Kidnapped for ransom in 1998, 26/11 survivor Gautam Adani faces biggest trial

AIMPLB to hold its annual general sessions in Bengaluru from November 23

Thanks for visiting Udayavani

You seem to have an Ad Blocker on.
To continue reading, please turn it off or whitelist Udayavani.