*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: pidgin

It looks like this bug was reported in Launchpad some time ago, but for
the wrong package.  I'd love to see it fixed.  Here's the original text:

As per http://developer.pidgin.im/ticket/3381 the Pidgin IM client does
not properly implement SSL and TLS, particularly components dealing with
feedback to the end user.

The client gives the end user no method of determining the validity of
the certificate; in cases where a server presents invalid or self-signed
certificates, Pidgin operates as normal. As a result, any man-in-the-
middle attack can handshake with the server and with the client (using a
fake certificate) and perform a decrypt-recrypt process to read the
data-- including message text and plaintext passwords-- in plain text.

No proof of concept for this specific attack exists. Those wishing to
write one can create an Ettercap plug-in

** Affects: pidgin (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

-- 
Pidgin XMPP TLS/SSL Man in the Middle attack
https://bugs.launchpad.net/bugs/251304
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to