First published: Tue May 31 2022(Updated: )
An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pidgin Pidgin | <2.14.9 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-26491 is a vulnerability discovered in Pidgin before version 2.14.9 that allows a remote attacker to redirect a client connection to a malicious server by spoofing DNS responses.
CVE-2022-26491 affects Pidgin versions before 2.14.9 and Debian Linux version 9.0.
The severity of CVE-2022-26491 is medium, with a severity value of 5.9.
An attacker can exploit CVE-2022-26491 by spoofing DNS responses to redirect a client connection to a malicious server.
To fix CVE-2022-26491, update Pidgin to version 2.14.9 or above.