Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/107550 | Third Party Advisory VDB Entry |
https://github.com/blazeinfosec/advisories/blob/master/signal-advisory.txt | Third Party Advisory |
http://www.securityfocus.com/bid/107550 | Third Party Advisory VDB Entry |
https://github.com/blazeinfosec/advisories/blob/master/signal-advisory.txt | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/107550 - Third Party Advisory, VDB Entry | |
References | () https://github.com/blazeinfosec/advisories/blob/master/signal-advisory.txt - Third Party Advisory |
Information
Published : 2019-03-24 02:29
Updated : 2024-11-21 04:52
NVD link : CVE-2019-9970
Mitre link : CVE-2019-9970
CVE.ORG link : CVE-2019-9970
JSON object : View
Products Affected
signal
- private_messenger
- signal-desktop
CWE