The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/project-zero/issues/detail?id=1936 | Third Party Advisory |
https://news.ycombinator.com/item?id=21161432 | Third Party Advisory |
https://twitter.com/moxie/status/1180226374851710976 | Third Party Advisory |
Configurations
History
07 Nov 2023, 03:06
Type | Values Removed | Values Added |
---|---|---|
Summary | The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs |
07 Apr 2022, 17:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-670 | |
CPE | cpe:2.3:a:signal:private_messenger:*:*:*:*:*:android:*:* | |
First Time |
Signal private Messenger
|
Information
Published : 2019-10-05 02:15
Updated : 2024-05-17 01:34
NVD link : CVE-2019-17192
Mitre link : CVE-2019-17192
CVE.ORG link : CVE-2019-17192
JSON object : View
Products Affected
signal
- private_messenger
CWE
CWE-670
Always-Incorrect Control Flow Implementation