Show plain JSON{"containers": {"cna": {"affected": [{"product": "WhatsApp Android", "vendor": "Facebook", "versions": [{"status": "affected", "version": "2.20.35"}, {"lessThan": "2.20.35", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "WhatsApp Business for Android", "vendor": "Facebook", "versions": [{"status": "affected", "version": "2.20.20"}, {"lessThan": "2.20.20", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "WhatsApp iPhone", "vendor": "Facebook", "versions": [{"status": "affected", "version": "2.20.30"}, {"lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"product": "WhatsApp Business for iPhone", "vendor": "Facebook", "versions": [{"status": "affected", "version": "2.20.30"}, {"lessThan": "2.20.30", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "dateAssigned": "2020-09-03T00:00:00", "descriptions": [{"lang": "en", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-787", "description": "Out-of-bounds Write (CWE-787)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2020-09-03T21:10:19", "orgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "shortName": "facebook"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://www.whatsapp.com/security/advisories/2020"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve-assign@fb.com", "DATE_ASSIGNED": "2020-09-03", "ID": "CVE-2020-1894", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "WhatsApp Android", "version": {"version_data": [{"version_affected": "!=>", "version_value": "2.20.35"}, {"version_affected": "<", "version_value": "2.20.35"}]}}, {"product_name": "WhatsApp Business for Android", "version": {"version_data": [{"version_affected": "!=>", "version_value": "2.20.20"}, {"version_affected": "<", "version_value": "2.20.20"}]}}, {"product_name": "WhatsApp iPhone", "version": {"version_data": [{"version_affected": "!=>", "version_value": "2.20.30"}, {"version_affected": "<", "version_value": "2.20.30"}]}}, {"product_name": "WhatsApp Business for iPhone", "version": {"version_data": [{"version_affected": "!=>", "version_value": "2.20.30"}, {"version_affected": "<", "version_value": "2.20.30"}]}}]}, "vendor_name": "Facebook"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Out-of-bounds Write (CWE-787)"}]}]}, "references": {"reference_data": [{"name": "https://www.whatsapp.com/security/advisories/2020", "refsource": "CONFIRM", "url": "https://www.whatsapp.com/security/advisories/2020"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T06:53:59.872Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.whatsapp.com/security/advisories/2020"}]}]}, "cveMetadata": {"assignerOrgId": "4fc57720-52fe-4431-a0fb-3d2c8747b827", "assignerShortName": "facebook", "cveId": "CVE-2020-1894", "datePublished": "2020-09-03T21:10:19", "dateReserved": "2019-12-02T00:00:00", "dateUpdated": "2024-08-04T06:53:59.872Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}