CVE-2019-17192

The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs
Configurations

Configuration 1 (hide)

cpe:2.3:a:signal:private_messenger:*:*:*:*:*:android:*:*

History

07 Nov 2023, 03:06

Type Values Removed Values Added
Summary ** DISPUTED ** The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs. The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs

07 Apr 2022, 17:55

Type Values Removed Values Added
CWE CWE-20 CWE-670
CPE cpe:2.3:a:signal:signal_private_messenger:*:*:*:*:*:android:*:* cpe:2.3:a:signal:private_messenger:*:*:*:*:*:android:*:*
First Time Signal private Messenger

Information

Published : 2019-10-05 02:15

Updated : 2024-05-17 01:34


NVD link : CVE-2019-17192

Mitre link : CVE-2019-17192

CVE.ORG link : CVE-2019-17192


JSON object : View

Products Affected

signal

  • private_messenger
CWE
CWE-670

Always-Incorrect Control Flow Implementation