pidgin is vulnerable to spoofing attack. The NSS SSL implementation in Pidgin did not properly verify the authenticity of SSL certificates. This could have resulted in users unknowingly connecting to a malicious SSL service.
bugs.debian.org/cgi-bin/bugreport.cgi?bug=492434
developer.pidgin.im/attachment/ticket/6500/nss-cert-verify.patch
developer.pidgin.im/attachment/ticket/6500/nss_add_rev.patch
developer.pidgin.im/ticket/6500
secunia.com/advisories/31390
secunia.com/advisories/32859
secunia.com/advisories/33102
support.avaya.com/elmodocs2/security/ASA-2008-493.htm
www.mandriva.com/security/advisories?name=MDVSA-2009:025
www.redhat.com/security/updates/classification/#moderate
www.redhat.com/support/errata/RHSA-2008-1023.html
www.securityfocus.com/bid/30553
www.ubuntu.com/usn/USN-675-1
www.vupen.com/english/advisories/2008/2318
access.redhat.com/errata/RHSA-2008:1023
bugzilla.redhat.com/show_bug.cgi?id=474212
exchange.xforce.ibmcloud.com/vulnerabilities/44220
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10979
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18327