CVE-2019-9970

Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:signal:private_messenger:*:*:*:*:*:android:*:*
cpe:2.3:a:signal:signal-desktop:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/107550 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/107550 - Third Party Advisory, VDB Entry
References () https://github.com/blazeinfosec/advisories/blob/master/signal-advisory.txt - Third Party Advisory () https://github.com/blazeinfosec/advisories/blob/master/signal-advisory.txt - Third Party Advisory

Information

Published : 2019-03-24 02:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9970

Mitre link : CVE-2019-9970

CVE.ORG link : CVE-2019-9970


JSON object : View

Products Affected

signal

  • private_messenger
  • signal-desktop