CVE-2019-10044
Published: 25 March 2019
Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
Priority
Status
Package | Release | Status |
---|---|---|
telegram-desktop Launchpad, Ubuntu, Debian |
impish |
Not vulnerable
|
jammy |
Not vulnerable
|
|
lunar |
Does not exist
|
|
bionic |
Needs triage
|
|
focal |
Not vulnerable
(2.1.7+ds-2~ubuntu20.04.1)
|
|
groovy |
Not vulnerable
|
|
hirsute |
Not vulnerable
|
|
kinetic |
Not vulnerable
|
|
trusty |
Does not exist
|
|
upstream |
Released
(1.8.4-1)
|
|
xenial |
Does not exist
|
|
mantic |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |