CVE-2022-26491
Severity CVSS v4.0:
Pending analysis
Type:
CWE-295
Improper Certificate Validation
Publication date:
02/06/2022
Last modified:
09/06/2022
Description
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
Impact
Base Score 3.x
5.90
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:* | 2.14.9 (excluding) | |
| cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://developer.pidgin.im/wiki/FullChangeLog
- https://github.com/xsf/xeps/pull/1158
- https://keep.imfreedom.org/pidgin/pidgin/rev/13cdb7956bdc
- https://lists.debian.org/debian-lts-announce/2022/06/msg00005.html
- https://mail.jabber.org/pipermail/standards/2022-February/038759.html
- https://pidgin.im/about/security/advisories/cve-2022-26491/



