CVE-2014-3694

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.4 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:P/I:P/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 78%
VendorProductVersion
opensuseopensuse
12.3
opensuseopensuse
13.1
opensuseopensuse
13.2
canonicalubuntu_linux
12.04
canonicalubuntu_linux
14.04
canonicalubuntu_linux
14.10
debiandebian_linux
7.0
pidginpidgin
𝑥
≤ 2.10.9
pidginpidgin
2.10.0
pidginpidgin
2.10.1
pidginpidgin
2.10.2
pidginpidgin
2.10.3
pidginpidgin
2.10.4
pidginpidgin
2.10.5
pidginpidgin
2.10.6
pidginpidgin
2.10.7
pidginpidgin
2.10.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
pidgin
bullseye
2.14.1-1
fixed
bookworm
2.14.12-1
fixed
sid
2.14.13-2
fixed
trixie
2.14.13-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
pidgin
utopic
Fixed 1:2.10.9-0ubuntu7.1
released
trusty
Fixed 1:2.10.9-0ubuntu3.2
released
precise
Fixed 1:2.10.3-0ubuntu1.6
released
lucid
ignored
Common Weakness Enumeration