vendor:
Hexchat IRC client
by:
PizzaHatHacker
7,5
CVSS
HIGH
Stack Buffer Overflow
119
CWE
Product Name: Hexchat IRC client
Affected Version From: 2.11.0
Affected Version To: 2.10.2
Patch Exists: YES
Related CWE: CVE-2016-2233
CPE: a:hexchat:hexchat
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Linux (64 bits) + Windows 8.1 (64 bits)
2016
Hexchat IRC client – CAP LS Handling Stack Buffer Overflow
Hexchat IRC client receives the available extensions from the IRC server (CAP LS message) and constructs the request string to indicate later which one to use (CAP REQ message). This request string is stored in the fixed size (256 bytes) byte array 'buffer'. It has enough space for all possible options combined, BUT it will overflow if some options are repeated.
Mitigation:
Update to the latest version of Hexchat IRC client.