First published: Fri Sep 28 2018(Updated: )
Telegram Desktop (aka tdesktop) 1.3.16 alpha, when "Use proxy" is enabled, sends credentials and application data in cleartext over the SOCKS5 protocol.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Telegram Telegram Desktop | =1.3.16-alpha |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-17613 is a vulnerability in Telegram Desktop version 1.3.16 alpha that allows the transmission of credentials and application data in cleartext when the "Use proxy" feature is enabled.
CVE-2018-17613 has a severity rating of 9.8, which is classified as critical.
CVE-2018-17613 affects Telegram Desktop version 1.3.16 alpha when the "Use proxy" feature is enabled.
To fix CVE-2018-17613, update Telegram Desktop to a version that has patched the vulnerability.
More information about CVE-2018-17613 can be found at the following references: [Reference 1](https://seclists.org/oss-sec/2018/q3/280), [Reference 2](https://www.inputzero.io/2018/09/telegram-share-password-in-cleartext.html).