The remote SUSE Linux SLED12 / SLES12 host has packages installed that are affected by a vulnerability as referenced in the SUSE-SU-2022:1664-1 advisory. - An issue was discovered in Pidgin before 2.14.9. A remote attacker who can spoof DNS responses can redirect a client connection to a malicious server. The client will perform TLS certificate verification of the malicious domain name instead of the original XMPP service domain, allowing the attacker to take over control over the XMPP connection and to obtain user credentials and all communication content. This is similar to CVE-2022-24968. (CVE-2022-26491) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
Slackware Linux 14.0 / 14.1 / 14.2 / 15.0 / current pidgin Vulnerability (SSA:2022-120-01)
SUSE SLED15 / SLES15 Security Update : pidgin (SUSE-SU-2022:1665-1)
SUSE SLED15 / SLES15 Security Update : pidgin (SUSE-SU-2022:1693-1)
pidgin - security update
Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket
TLS certificate validation error
TLS certificate validation error in Mellium