Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2019-11932
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A double free vulnerability in the DDGifSlurp function in decoding.c in the android-gif-drawable library before version 1.2.18, as used in WhatsApp for Android before version 2.19.244 and many other Android applications, allows remote attackers to execute arbitrary code or cause a denial of service when the library is used to parse a specially crafted GIF image.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
双重释放
Source: NVD (National Vulnerability Database)
Vulnerability Title
Facebook WhatsApp 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Facebook WhatsApp是美国Facebook公司的一套利用网络传送短信的移动应用程序。该应用程序通过智能手机中的联络人信息,查找使用该软件的联络人传送文字、图片等。 基于Android平台的Facebook WhatsApp 2.19.244之前版本中的libpl_droidsonroids_gif 1.2.18之前版本的decoding.c文件的DDGifSlurp函数存在资源管理错误漏洞。远程攻击者可利用该漏洞执行任意代码或造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
koral--android-gif-drawable unspecified ~ 1.2.18 -
II. Public POCs for CVE-2019-11932
#POC DescriptionSource LinkShenlong Link
1 double-free bug in WhatsApp exploit pochttps://github.com/dorkerdevil/CVE-2019-11932POC Details
2Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gifhttps://github.com/awakened1712/CVE-2019-11932POC Details
3This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)https://github.com/JasonJerry/WhatsRCEPOC Details
4Double-Free BUG in WhatsApp exploit poc.https://github.com/TulungagungCyberLink/CVE-2019-11932POC Details
5Nonehttps://github.com/infiniteLoopers/CVE-2019-11932POC Details
6The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244https://github.com/5l1v3r1/CVE-2019-11932POC Details
7This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. https://github.com/valbrux/CVE-2019-11932-SupportAppPOC Details
8Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.https://github.com/fastmo/CVE-2019-11932POC Details
9Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/https://github.com/mRanonyMousTZ/CVE-2019-11932-whatsApp-exploitPOC Details
10Nonehttps://github.com/SmoZy92/CVE-2019-11932POC Details
11https://github.com/awakened1712/CVE-2019-11932https://github.com/dashtic172/https-github.com-awakened171POC Details
12Whatsapp Automatic Payload Generator [CVE-2019-11932]https://github.com/Err0r-ICA/WhatsPayloadRCEPOC Details
13Nonehttps://github.com/starling021/CVE-2019-11932-SupportAppPOC Details
14Nonehttps://github.com/primebeast/CVE-2019-11932POC Details
15https://github.com/awakened1712/CVE-2019-11932://github.com/awakened1712/CVE-2019-11932https://github.com/BadAssAiras/helloPOC Details
16Whatsapp remote code execution CVE-2019-11932 https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/https://github.com/kal1gh0st/WhatsAppHACK-RCEPOC Details
17Nonehttps://github.com/zxn1/CVE-2019-11932POC Details
18Exploit Analysis of The WhatsApp Double-Free Vulnerability (CVE-2019-11932) Using the GEF-GDB Debuggerhttps://github.com/k3vinlusec/WhatsApp-Double-Free-Vulnerability_CVE-2019-11932POC Details
19CVE-2019-11932https://github.com/Tabni/https-github.com-awakened1712-CVE-2019-11932POC Details
20Nonehttps://github.com/0759104103/cd-CVE-2019-11932POC Details
21Double-Free BUG in WhatsApp exploit poc.https://github.com/tucommenceapousser/CVE-2019-11932POC Details
22Double-Free BUG in WhatsApp exploit poc.https://github.com/tucommenceapousser/CVE-2019-11932detaPOC Details
23https://github.com/awakened1712/CVE-2019-11932https://github.com/OrdaraatSite/https-github.com-awakened171POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2019-11932
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2019-11932

No comments yet


Leave a comment