DNS spoofing vulnerability in Pidgin (Mac OS)ID: oval:org.secpod.oval:def:83373 | Date: (C)2022-08-24 (M)2023-12-03 |
Class: VULNERABILITY | Family: macos |
The host is installed with Pidgin before 2.14.9 and is prone to a DNS spoofing vulnerability. A flaw is present in the application, which fails to validate the TLS certificate. On successful exploitation, the client can perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 11 |
Apple Mac OS 12 |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.11 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.15 |