WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-32802 WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T05:56:14.871Z

Reserved: 2022-04-02T00:00:00

Link: CVE-2022-28352

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-04-02T17:15:07.997

Modified: 2024-11-21T06:57:11.787

Link: CVE-2022-28352

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.