Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107610 | Third Party Advisory VDB Entry |
https://github.com/blazeinfosec/advisories/blob/master/telegram-advisory.txt | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/107610 | Third Party Advisory VDB Entry |
https://github.com/blazeinfosec/advisories/blob/master/telegram-advisory.txt | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107610 - Third Party Advisory, VDB Entry | |
References | () https://github.com/blazeinfosec/advisories/blob/master/telegram-advisory.txt - Exploit, Third Party Advisory |
Information
Published : 2019-03-25 20:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10044
Mitre link : CVE-2019-10044
CVE.ORG link : CVE-2019-10044
JSON object : View
Products Affected
telegram
- telegram
- telegram_desktop
microsoft
- windows
CWE