CVE-2019-9970

Source
https://cve.org/CVERecord?id=CVE-2019-9970
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9970.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2019-9970
Published
2019-03-24T02:29:00.670Z
Modified
2026-02-14T00:38:15.477227Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

Open Whisper Signal (aka Signal-Desktop) through 1.23.1 and the Signal Private Messenger application through 4.35.3 for Android are vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.

References

Affected packages

Git / github.com/signalapp/signal-android

Affected ranges

Type
GIT
Repo
https://github.com/signalapp/signal-android
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

2.*
2.0.4
v0.*
v0.6
v0.6.1
v0.6.2
v0.7
v0.7.2
v0.7.3
v0.7.4
v0.8
v0.8.1
v0.8.2
v0.8.3
v0.8.4
v0.8.5
v0.8.6
v0.9
v0.9.1
v0.9.2
v0.9.3
v0.9.4
v0.9.5
v0.9.6
v0.9.7
v0.9.8
v0.9.9.1
v0.9.9.2
v0.9.9.3
v0.9.9.4
v0.9.9.5
v0.9.9.6
v0.9.9.7
v0.9.9.8
v0.9.9.9
v1.*
v1.0
v1.0.1
v1.0.2
v1.0.3
v1.0.4
v1.0.5
v1.0.6
v2.*
v2.0
v2.0.1
v2.0.2
v2.0.3
v2.0.5
v2.0.6
v2.0.7
v2.0.8
v2.1.0
v2.1.1
v2.1.10
v2.1.2
v2.1.4
v2.1.6
v2.1.7
v2.1.8
v2.1.9
v2.10.0
v2.10.1
v2.10.2
v2.11.0
v2.11.1
v2.12.0
v2.13.0
v2.14.0
v2.14.1
v2.14.2
v2.14.3
v2.14.4
v2.16.0
v2.16.1
v2.16.2
v2.16.3
v2.16.4
v2.17.0
v2.18.0
v2.18.1
v2.18.2
v2.19.0
v2.19.1
v2.2.0
v2.21.0
v2.22.0
v2.22.1
v2.22.2
v2.23.0
v2.23.1
v2.23.3
v2.24.0
v2.24.1
v2.25.0
v2.25.1
v2.25.3
v2.26.0
v2.26.2
v2.26.3
v2.26.5
v2.27.0
v2.27.1
v2.27.2
v2.28.0
v2.28.1
v2.3.0
v2.3.1
v2.3.2
v2.3.3
v2.32.2
v2.4.1
v2.4.2
v2.5.1
v2.5.2
v2.5.3
v2.6.0
v2.6.2
v2.6.3
v2.6.4
v2.7.0-B1
v2.8.0
v2.9.1
v2.9.2
v2.9.3
v3.*
v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.1.0
v3.1.1
v3.10.0
v3.11.0
v3.11.1
v3.12.0
v3.13.0
v3.13.1
v3.14.0
v3.14.1
v3.14.2
v3.15.0
v3.15.1
v3.15.2
v3.16.0
v3.16.1
v3.17.0
v3.18.0
v3.18.1
v3.18.2
v3.18.3
v3.19.0
v3.20.1
v3.20.2
v3.20.3
v3.20.4
v3.21.0
v3.21.1
v3.21.2
v3.21.3
v3.22.0
v3.22.1
v3.22.2
v3.23.0
v3.24.0
v3.24.1
v3.25.0
v3.25.1
v3.25.2
v3.25.3
v3.25.4
v3.26.0
v3.26.1
v3.26.2
v3.27.0
v3.27.1
v3.28.0
v3.28.1
v3.28.2
v3.28.3
v3.28.4
v3.29.2
v3.29.4
v3.29.5
v3.29.6
v3.3.0
v3.3.1
v3.3.2
v3.30.0
v3.30.1
v3.30.2
v3.30.3
v3.30.4
v3.31.0
v3.31.1
v3.31.2
v3.31.4
v3.4.0
v3.4.2
v3.5.0
v3.5.1
v3.5.2
v3.6.0
v3.6.1
v3.7.0
v3.7.1
v3.7.2
v3.8.0
v3.9.0
v3.9.1
v4.*
v4.0.0
v4.0.1
v4.1.0
v4.10.1
v4.10.10
v4.10.11
v4.10.12
v4.10.2
v4.10.5
v4.10.6
v4.10.7
v4.10.8
v4.10.9
v4.11.1
v4.11.2
v4.11.3
v4.11.5
v4.12.3
v4.13.0
v4.13.1
v4.13.2
v4.13.3
v4.13.4
v4.13.5
v4.13.6
v4.13.7
v4.14.0
v4.14.1
v4.14.10
v4.14.2
v4.14.4
v4.14.5
v4.14.6
v4.14.7
v4.14.8
v4.14.9
v4.15.0
v4.15.1
v4.15.2
v4.15.3
v4.15.5
v4.16.3
v4.16.4
v4.16.6
v4.16.7
v4.16.9
v4.17.0
v4.17.1
v4.17.2
v4.17.3
v4.17.4
v4.17.5
v4.18.0
v4.18.1
v4.18.2
v4.18.3
v4.19.1
v4.19.2
v4.19.3
v4.2.0
v4.2.1
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.20.2
v4.20.3
v4.20.4
v4.20.5
v4.20.6
v4.20.7
v4.20.8
v4.20.9
v4.21.0
v4.21.1
v4.21.2
v4.21.3
v4.21.4
v4.21.5
v4.21.6
v4.22.0
v4.22.1
v4.22.2
v4.22.3
v4.22.4
v4.23.0
v4.23.1
v4.23.2
v4.23.3
v4.23.4
v4.24.0
v4.24.1
v4.24.2
v4.24.3
v4.24.4
v4.24.5
v4.24.6
v4.24.7
v4.24.8
v4.25.0
v4.25.1
v4.25.10
v4.25.2
v4.25.3
v4.25.4
v4.25.5
v4.25.6
v4.25.7
v4.25.8
v4.25.9
v4.26.0
v4.26.1
v4.26.2
v4.27.0
v4.27.1
v4.27.2
v4.27.3
v4.28.0
v4.28.1
v4.29.0
v4.29.1
v4.29.2
v4.29.3
v4.29.4
v4.29.5
v4.29.6
v4.29.7
v4.3.0
v4.3.1
v4.3.2
v4.30.0
v4.30.1
v4.30.2
v4.30.4
v4.30.5
v4.30.6
v4.30.7
v4.31.0
v4.31.1
v4.31.2
v4.31.3
v4.31.4
v4.31.5
v4.31.6
v4.31.7
v4.31.8
v4.32.0
v4.32.1
v4.32.2
v4.32.3
v4.32.4
v4.32.5
v4.32.6
v4.32.7
v4.32.8
v4.33.0
v4.33.1
v4.33.2
v4.33.3
v4.33.4
v4.33.5
v4.34.0
v4.34.1
v4.34.2
v4.34.3
v4.34.4
v4.34.5
v4.34.6
v4.34.7
v4.34.8
v4.35.0
v4.35.1
v4.35.2
v4.35.3
v4.4.0
v4.5.0
v4.5.2
v4.5.3
v4.6.0
v4.7.0
v4.7.1
v4.7.2
v4.7.3
v4.7.4
v4.8.0
v4.8.1
v4.9.0
v4.9.1
v4.9.2
v4.9.3
v4.9.4
v4.9.5
v4.9.6
v4.9.8
v4.9.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-9970.json"