CVE Vulnerabilities

CVE-2014-3694

Published: Oct 29, 2014 | Modified: Apr 12, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
6.4 MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
RedHat/V2
2.6 LOW
AV:N/AC:H/Au:N/C:N/I:P/A:N
RedHat/V3
3.1 LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Affected Software

NameVendorStart VersionEnd Version
OpensuseOpensuse12.3 (including)12.3 (including)
OpensuseOpensuse13.1 (including)13.1 (including)
OpensuseOpensuse13.2 (including)13.2 (including)
Red Hat Enterprise Linux 7RedHatpidgin-0:2.10.11-5.el7*
PidginUbuntudevel*
PidginUbuntuesm-infra-legacy/trusty*
PidginUbuntulucid*
PidginUbuntuprecise*
PidginUbuntutrusty*
PidginUbuntutrusty/esm*
PidginUbuntuupstream*
PidginUbuntuutopic*

References