MEDIUM · 6.4

CVE-2014-3694

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X...

Vulnerability Description

The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVSS Score

6.4

MEDIUM

AV:N/AC:L/Au:N/C:P/I:P/A:N
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
OpensuseOpensuse12.3
CanonicalUbuntu Linux12.04
DebianDebian Linux7.0
PidginPidgin<= 2.10.9

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-3694?

CVE-2014-3694 is a vulnerability with a CVSS score of 6.4 (MEDIUM). The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X...

How severe is CVE-2014-3694?

CVE-2014-3694 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-3694?

Check the references section above for vendor advisories and patch information. Affected products include: Opensuse Opensuse, Canonical Ubuntu Linux, Debian Debian Linux, Pidgin Pidgin.