Contact UsWDN News & more...

Severe Bug Discovered in Signal Messaging App for Windows and Linux


Security researchers win stumbled on a severe vulnerability in the smartly-liked discontinue-to-discontinue encrypted Signal messaging app for Residence windows and Linux desktops which would perhaps perchance perchance perchance enable a ways off attackers to enact malicious code on recipients machine perfect by sending a message—with out requiring any particular person interaction.

Found by Alfredo Ortega, a instrument safety consultant from Argentina, the vulnerability changed into once announced on Twitter perfect about a hours previously with a proof-of-belief video, demonstrating how a javascript payload sent over Signal for desktop app efficiently purchased done on the recipient’s machine.

Despite the indisputable truth that technical info of the vulnerability win no longer been revealed as of now, the divulge looks to be a a ways off code execution vulnerability in Signal or as a minimum one thing very shut to power defective-region scripting (XSS) which in the extinguish could perhaps perchance perchance enable attackers to inject malicious code onto targeted Residence windows and Linux systems.

“For the time being, we can fully verify the execution of javascript code. On the opposite hand we are monitoring a heap corruption divulge, and it’s very seemingly than the javascript execution could perhaps perchance perchance result in native code execution with extra overview.” Ortega urged The Hacker News.

Ortega also confirms us that the exploitation of this divulge requires chaining about a vulnerabilities stumbled on by two other safety researchers from Argentina, Ivan and Juliano.

“I can verify that this bug did no longer exist ahead of and changed into once last launched since the devs forgot why there changed into once a regex there to originate with. I’d desire to counsel a commentary to this commentary if it’s a ways never repeated again (TBD),” Ivan said.

At this moment, it’s a ways never definite if the first vulnerability or other chained bugs stay fully in the supply code of Signal or also in the smartly-liked Electron web utility framework, the technology on which Signal desktop functions are basically based.

If the flaw resides in the Electron framework, it’ll also additionally impact other widely-used desktop functions as successfully, along with Skype, WordPress, and Slack, which also employ the a connected framework.

Furthermore, the infosec community is also alarmed that if this flaw permits a ways off attackers to bewitch their secret encryption keys, it could well most likely perchance perchance perchance be the worst nightmare for Signal users.

One of the best news is that the Launch Divulge Programs has already addressed the divulge and proper now released new versions of Signal app inner about a hours after receiving the accountable vulnerability disclosure by the researcher.

The vital vulnerability that triggers the code execution has been patched in Signal stable release version 1.10.1 and pre-release version So, users are told to update their Signal for desktop functions as at this time as conceivable.

“At the present we are undecided all of them [the vulnerabilities chained together] were fastened” Ortega urged The Hacker News.

The most novel release also patched a recently disclosed vulnerability in Signal for desktop apps which changed into once exposing disappearing messages in a particular person-readable database of macOS’s Notification Center, even in the occasion that they are deleted from the app.

We can update this text as at this time as we rep more info of the vulnerability from the researcher. Till then, protect tuned to Fb and Twitter accounts.