FreeBSD : Weechat -- Possible man-in-the-middle attack in TLS connection to servers (3ba1ca94-a563-11ec-8be6-d4c9ef517024)

high Nessus Plugin ID 158995

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by a vulnerability as referenced in the 3ba1ca94-a563-11ec-8be6-d4c9ef517024 advisory.

- The Weechat project reports: After changing the options weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user, the TLS verification function is lost. Consequently, any connection to a server with TLS is made without verifying the certificate, which could lead to a man-in-the-middle attack. Connection to IRC servers with TLS is affected, as well as any connection a server made by a plugin or a script using the function hook_connect.
(3ba1ca94-a563-11ec-8be6-d4c9ef517024)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://weechat.org/doc/security/WSA-2022-1/

http://www.nessus.org/u?e32ad78c

Plugin Details

Severity: High

ID: 158995

File Name: freebsd_pkg_3ba1ca94a56311ec8be6d4c9ef517024.nasl

Version: 1.3

Type: local

Published: 3/16/2022

Updated: 11/6/2023

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:weechat, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Ease: No known exploits are available

Patch Publication Date: 3/16/2022

Vulnerability Publication Date: 3/13/2022