Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Debian Security Advisory DSA 099-1 (XChat)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host is missing an update to XChat announced via advisory DSA 099-1.
Insight
Insight
zen-parse found a vulnerability in the XChat IRC client that allows an attacker to take over the users IRC session. It is possible to trick XChat IRC clients into sending arbitrary commands to the IRC server they are on, potentially allowing social engineering attacks, channel takeovers, and denial of service. This problem exists in versions 1.4.2 and 1.4.3. Later versions of XChat are vulnerable as well, but this behaviour is controlled by the configuration variable »percascii«, which defaults to 0. If it is set to 1 then the problem becomes apparent in 1.6/1.8 a swell. This problem has been fixed in upstream version 1.8.7 and in version 1.4.3-1 for the current stable Debian release (2.2) with a patch provided from the upstream author Peter Zelezny. We recommend that you upgrade your XChat packages immediately, since this problem is already actively being exploited.
Solution
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20099-1