Exploit/Advisories

Published on March 25th, 2019 📆 | 3885 Views ⚑

0

Signal CVE-2019-9970 Homograph Domain Spoofing Vulnerability


iSpeech.org

Signal is prone to a domain-spoofing vulnerability because it fails to adequately handle homographs in international domain name (IDN) domains.

An attacker may leverage this issue to spoof a domain that visually resembles a legitimate domain. This may lead to a false sense of trust because the user may be presented with a URI of a seemingly trusted domain while interacting with the attacker's malicious site.
The following products and versions are vulnerable:
Signal Desktop through 1.23.1
Signal Private Messenger through 4.35.3

Information

Bugtraq ID: 107550

Class: Input Validation Error

CVE: CVE-2019-9970

Remote: Yes





Local: No

Published: Mar 23 2019 12:00AM

Updated: Mar 23 2019 12:00AM

Credit: Julio Cesar Fort from Blaze Information Security

Vulnerable: Signal Private Messenger 4.35.3
Signal Private Messenger 4.34.8
Signal Private Messenger 4.33
Signal Private Messenger 4.32.8
Signal Private Messenger 4.31.3
Signal Private Messenger 4.23
Signal Private Messenger 4.11.3
Signal Private Messenger 4.10.10
Signal Private Messenger 4.10.7
Signal Private Messenger 4.9
Signal Private Messenger 4.6
Signal Private Messenger 4.0
Signal Private Messenger 3.26
Signal Private Messenger 3.24
Signal Private Messenger 3.17
Signal Private Messenger 3.14.1
Signal Private Messenger 3.1.1
Signal Desktop 1.23.1
Signal Desktop 1.23
Signal Desktop 1.21
Signal Desktop 1.19

Not Vulnerable:

Exploit

The researcher has created a proof-of-concept to demonstrate the issue. Please see the references for more information.


Tagged with:



Comments are closed.