{"id":"UBUNTU-CVE-2014-3694","details":"The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.","modified":"2026-02-04T04:01:13.415907Z","published":"2014-10-23T00:00:00Z","related":["USN-2390-1"],"upstream":["CVE-2014-3694"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2014-3694"},{"type":"REPORT","url":"http://www.pidgin.im/news/security/?id=86"},{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2390-1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2014-3694"}],"affected":[{"package":{"name":"pidgin","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/pidgin@1:2.10.9-0ubuntu3.2?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.10.9-0ubuntu3.2"}]}],"versions":["1:2.10.7-0ubuntu4.1","1:2.10.7-0ubuntu4.2","1:2.10.9-0ubuntu1","1:2.10.9-0ubuntu2","1:2.10.9-0ubuntu3","1:2.10.9-0ubuntu3.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"finch","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"finch-dev","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"libpurple-bin","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"libpurple-dev","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"libpurple0","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"pidgin","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"pidgin-data","binary_version":"1:2.10.9-0ubuntu3.2"},{"binary_name":"pidgin-dev","binary_version":"1:2.10.9-0ubuntu3.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2014/UBUNTU-CVE-2014-3694.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}