7.5
CVSSv2

CVE-2002-0006

Published: 25/06/2002 Updated: 10/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

XChat 1.8.7 and previous versions, including default configurations of 1.4.2 and 1.4.3, allows remote malicious users to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.

Vulnerable Product Search on Vulmon Subscribe to Product

xchat xchat 1.4.2

xchat xchat 1.4.3

Vendor Advisories

zen-parse found a vulnerability in the XChat IRC client that allows an attacker to take over the users IRC session It is possible to trick XChat IRC clients into sending arbitrary commands to the IRC server they are on, potentially allowing social engineering attacks, channel takeovers, and denial of service This problem exists in versions 142 ...

Exploits

source: wwwsecurityfocuscom/bid/3830/info X-Chat is a graphical client for IRC It requires the GTK+ toolkit, and is available for many Linux and Unix operating systems If a CTCP ping request includes escaped newline characters and additional IRC commands, these commands may be executed by the vulnerable client It is possible to gain o ...