The WebRTC component in the Signal Private Messenger application through 4.47.7 for Android processes videoconferencing RTP packets before a callee chooses to answer a call, which might make it easier for remote attackers to cause a denial of service or possibly have unspecified other impact via malformed packets. NOTE: the vendor plans to continue this behavior for performance reasons unless a WebRTC design change occurs
References
Link | Resource |
---|---|
https://bugs.chromium.org/p/project-zero/issues/detail?id=1936 | Third Party Advisory |
https://news.ycombinator.com/item?id=21161432 | Third Party Advisory |
https://twitter.com/moxie/status/1180226374851710976 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-10-05T01:13:31
Updated: 2019-10-05T01:13:31
Reserved: 2019-10-05T00:00:00
Link: CVE-2019-17192
JSON object: View
NVD Information
Status : Modified
Published: 2019-10-05T02:15:11.377
Modified: 2024-05-17T01:34:29.910
Link: CVE-2019-17192
JSON object: View
Redhat Information
No data.
CWE