Debian Security Advisory
DSA-099-1 xchat -- IRC session hijacking
- Date Reported:
- 12 Jan 2002
- Affected Packages:
- XChat
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2002-0006.
- More information:
-
zen-parse found a vulnerability in the XChat IRC client that allows an attacker to take over the users IRC session.
It is possible to trick XChat IRC clients into sending arbitrary commands to the IRC server they are on, potentially allowing social engineering attacks, channel takeovers, and denial of service. This problem exists in versions 1.4.2 and 1.4.3. Later versions of XChat are vulnerable as well, but this behaviour is controlled by the configuration variable »percascii«, which defaults to 0. If it is set to 1 then the problem becomes apparent in 1.6/1.8 as well.
This problem has been fixed in upstream version 1.8.7 and in version 1.4.3-1 for the current stable Debian release (2.2) with a patch provided from the upstream author Peter Zelezny. We recommend that you upgrade your XChat packages immediately, since this problem is already actively being exploited.
- Fixed in:
-
Debian GNU/Linux 2.2 (potato)
- Source:
- http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3.orig.tar.gz
- http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3-1.dsc
- http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3-1.diff.gz
- http://security.debian.org/dists/stable/updates/main/source/xchat_1.4.3-1.dsc
- Architecture-independent component:
- http://security.debian.org/dists/stable/updates/main/binary-all/xchat-common_1.4.3-1_all.deb
- Alpha:
- http://security.debian.org/dists/stable/updates/main/binary-alpha/xchat-gnome_1.4.3-1_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/xchat-text_1.4.3-1_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/xchat_1.4.3-1_alpha.deb
- http://security.debian.org/dists/stable/updates/main/binary-alpha/xchat-text_1.4.3-1_alpha.deb
- ARM:
- http://security.debian.org/dists/stable/updates/main/binary-arm/xchat-gnome_1.4.3-1_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/xchat-text_1.4.3-1_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/xchat_1.4.3-1_arm.deb
- http://security.debian.org/dists/stable/updates/main/binary-arm/xchat-text_1.4.3-1_arm.deb
- Intel ia32:
- http://security.debian.org/dists/stable/updates/main/binary-i386/xchat-gnome_1.4.3-1_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/xchat-text_1.4.3-1_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/xchat_1.4.3-1_i386.deb
- http://security.debian.org/dists/stable/updates/main/binary-i386/xchat-text_1.4.3-1_i386.deb
- Motorola 680x0:
- http://security.debian.org/dists/stable/updates/main/binary-m68k/xchat_1.4.3-1_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/xchat-gnome_1.4.3-1_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/xchat-text_1.4.3-1_m68k.deb
- http://security.debian.org/dists/stable/updates/main/binary-m68k/xchat-gnome_1.4.3-1_m68k.deb
- PowerPC:
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/xchat-gnome_1.4.3-1_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/xchat_1.4.3-1_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/xchat-text_1.4.3-1_powerpc.deb
- http://security.debian.org/dists/stable/updates/main/binary-powerpc/xchat_1.4.3-1_powerpc.deb
- Sun Sparc:
- http://security.debian.org/dists/stable/updates/main/binary-sparc/xchat-text_1.4.3-1_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/xchat-gnome_1.4.3-1_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/xchat_1.4.3-1_sparc.deb
- http://security.debian.org/dists/stable/updates/main/binary-sparc/xchat-gnome_1.4.3-1_sparc.deb
MD5 checksums of the listed files are available in the original advisory.