Telegram 4.0.1 for Android

CPE Details

Telegram 4.0.1 for Android
4.0.1
2019-05-31
11h30 +00:00
2019-05-31
11h30 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:telegram:telegram:4.0.1:*:*:*:*:android:*:*

Informations

Vendor

telegram

Product

telegram

Version

4.0.1

Target Software

android

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2021-36769 2021-07-16 21h03 +00:00 A reordering issue exists in Telegram before 7.8.1 for Android, Telegram before 7.8.3 for iOS, and Telegram Desktop before 2.8.8. An attacker can cause the server to receive messages in a different order than they were sent a client.
5.3
Medium
CVE-2021-31315 2021-05-18 17h45 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the blit function of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-31317 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the VDasher constructor of their custom fork of the rlottie library. A remote attacker might be able to access Telegram's heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-31318 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Type Confusion in the LOTCompLayerItem::LOTCompLayerItem function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-31319 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by an Integer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-31320 2021-05-18 17h44 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the VGradientCache::generateGradientColorTable function of their custom fork of the rlottie library. A remote attacker might be able to overwrite heap memory out-of-bounds on a victim device via a malicious animated sticker.
7.1
High
CVE-2021-31321 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Stack Based Overflow in the gray_split_cubic function of their custom fork of the rlottie library. A remote attacker might be able to overwrite Telegram's stack memory out-of-bounds on a victim device via a malicious animated sticker.
7.1
High
CVE-2021-31322 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LOTGradient::populate function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-31323 2021-05-18 17h43 +00:00 Telegram Android <7.1.0 (2090), Telegram iOS <7.1, and Telegram macOS <7.1 are affected by a Heap Buffer Overflow in the LottieParserImpl::parseDashProperty function of their custom fork of the rlottie library. A remote attacker might be able to access heap memory out-of-bounds on a victim device via a malicious animated sticker.
5.5
Medium
CVE-2021-27351 2021-02-19 17h57 +00:00 The Terminate Session feature in the Telegram application through 7.2.1 for Android, and through 2.4.7 for Windows and UNIX, fails to invalidate a recently active session.
5.3
Medium
CVE-2021-27204 2021-02-12 06h48 +00:00 Telegram before 7.4 (212543) Stable on macOS stores the local passcode in cleartext, leading to information disclosure.
5.5
Medium
CVE-2021-27205 2021-02-12 06h48 +00:00 Telegram before 7.4 (212543) Stable on macOS stores the local copy of self-destructed messages in a sandbox path, leading to sensitive information disclosure.
5.5
Medium
CVE-2020-12474 2020-05-01 11h45 +00:00 Telegram Desktop through 2.0.1, Telegram through 6.0.1 for Android, and Telegram through 6.0.1 for iOS allow an IDN Homograph attack via Punycode in a public URL or a group chat invitation URL.
6.5
Medium
CVE-2020-10570 2020-03-24 12h56 +00:00 The Telegram application through 5.12 for Android, when Show Popup is enabled, might allow physically proximate attackers to bypass intended restrictions on message reading and message replying. This might be interpreted as a bypass of the passcode feature.
6.1
Medium
CVE-2019-16248 2019-09-11 20h19 +00:00 The "delete for" feature in Telegram before 5.11 on Android does not delete shared media files from the Telegram Images directory. In other words, there is a potentially misleading UI indication that a sender can remove a recipient's copy of a previously sent image (analogous to supported functionality in which a sender can remove a recipient's copy of a previously sent message).
5.5
Medium
CVE-2019-10044 2019-03-25 18h29 +00:00 Telegram Desktop before 1.5.12 on Windows, and the Telegram applications for Android, iOS, and Linux, is vulnerable to an IDN homograph attack when displaying messages containing URLs. This occurs because the application produces a clickable link even if (for example) Latin and Cyrillic characters exist in the same domain name, and the available font has an identical representation of characters from different alphabets.
8.8
High