{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T08:54:44.008","vulnerabilities":[{"cve":{"id":"CVE-2019-11931","sourceIdentifier":"cve-assign@fb.com","published":"2019-11-14T23:15:10.443","lastModified":"2024-11-21T04:22:00.433","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A stack-based buffer overflow could be triggered in WhatsApp by sending a specially crafted MP4 file to a WhatsApp user. The issue was present in parsing the elementary stream metadata of an MP4 file and could result in a DoS or RCE. This affects Android versions prior to 2.19.274, iOS versions prior to 2.19.100, Enterprise Client versions prior to 2.25.3, Business for Android versions prior to 2.19.104 and Business for iOS versions prior to 2.19.100."},{"lang":"es","value":"Se podría desencadenar un desbordamiento de búfer en la región heap de la memoria en WhatsApp mediante el envío de un archivo MP4 especialmente diseñado hacia un usuario de WhatsApp. El problema estaba presente en el análisis de los metadatos de flujo elemental de un archivo MP4 y podría resultar en un DoS o RCE. Esto afecta a Android versiones anteriores a la versión 2.19.274, iOS versiones anteriores a la versión 2.19.100, Enterprise Client versiones anteriores a la versión 2.25.3, Business for Android versiones anteriores a 2.19.104 y Business for iOS versiones anteriores a 2.19.100."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"cve-assign@fb.com","type":"Secondary","description":[{"lang":"en","value":"CWE-121"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:windows:*:*","versionEndIncluding":"2.18.368","matchCriteriaId":"41BBC667-45B4-4A71-8180-7E4E94741B7D"},{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"2.19.100","matchCriteriaId":"D2B2A95F-2B7C-4083-93DE-5925E2F99E4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp:*:*:*:*:*:android:*:*","versionEndExcluding":"2.19.274","matchCriteriaId":"92F3EF1F-6412-444C-8F07-972DD1A58F73"},{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:iphone_os:*:*","versionEndExcluding":"2.19.100","matchCriteriaId":"DE2B7E65-8D42-45E0-8D0C-8C8B0968384B"},{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp_business:*:*:*:*:*:android:*:*","versionEndExcluding":"2.19.104","matchCriteriaId":"55E17510-126E-41AB-8F13-7194854D6B03"},{"vulnerable":true,"criteria":"cpe:2.3:a:whatsapp:whatsapp_enterprise_client:*:*:*:*:*:*:*:*","versionEndExcluding":"2.25.3","matchCriteriaId":"F028C6FB-E5F4-4BC9-9DB5-A317240804F4"}]}]}],"references":[{"url":"https://www.facebook.com/security/advisories/cve-2019-11931","source":"cve-assign@fb.com","tags":["Third Party Advisory"]},{"url":"https://www.facebook.com/security/advisories/cve-2019-11931","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}