Lucene search

K
ubuntucveUbuntu.comUB:CVE-2020-17448
HistoryAug 11, 2020 - 12:00 a.m.

CVE-2020-17448

2020-08-1100:00:00
ubuntu.com
ubuntu.com
8
cve-2020-17448
telegram desktop
spoofed file type
protection mechanism
chat window
file extension
unix

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.7%

Telegram Desktop through 2.1.13 allows a spoofed file type to bypass the
Dangerous File Type Execution protection mechanism, as demonstrated by use
of the chat window with a filename that lacks an extension.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchtelegram-desktop< anyUNKNOWN
ubuntu20.04noarchtelegram-desktop< anyUNKNOWN

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

57.7%