{
  "threat_severity" : "Moderate",
  "public_date" : "2022-04-29T00:00:00Z",
  "bugzilla" : {
    "description" : "pidgin: MITM attack possible on non-DNSSEC XMPP connections",
    "id" : "2081227",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2081227"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
    "status" : "draft"
  },
  "cwe" : "CWE-924",
  "details" : [ "An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968.", "A flaw was found in Pidgin. This issue allows the performance of a man-in-the-middle attack (MITM) against a client via DNS spoofing if the XMPP connections are not using the Domain Name System Security Extensions (DNSSEC)." ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "pidgin",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "pidgin",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "fix_state" : "Will not fix",
    "package_name" : "pidgin",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-26491\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-26491" ],
  "name" : "CVE-2022-26491",
  "csaw" : false
}