Description
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
Published: 2022-05-31
Score: 5.9 Medium
EPSS: 1.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3043-1 pidgin security update
EUVD EUVD EUVD-2022-31049 An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
History

No history.

Subscriptions

Debian Debian Linux
Pidgin Pidgin
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:03:32.770Z

Reserved: 2022-03-06T00:00:00.000Z

Link: CVE-2022-26491

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-06-02T14:15:40.953

Modified: 2024-11-21T06:54:02.903

Link: CVE-2022-26491

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-04-29T00:00:00Z

Links: CVE-2022-26491 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses