Vulnerabilities > CVE-2002-0006 - Remote IRC Command Execution vulnerability in X-Chat CTCP Ping Arbitrary
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Exploit-Db
description | X-Chat 1.x CTCP Ping Arbitrary Remote IRC Command Execution Vulnerability. CVE-2002-0006. Remote exploit for linux platform |
id | EDB-ID:21210 |
last seen | 2016-02-02 |
modified | 2002-01-09 |
published | 2002-01-09 |
reporter | Marcus Meissner |
source | https://www.exploit-db.com/download/21210/ |
title | X-Chat 1.x CTCP Ping Arbitrary Remote IRC Command Execution Vulnerability |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-099.NASL |
description | zen-parse found a vulnerability in the XChat IRC client that allows an attacker to take over the users IRC session. It is possible to trick XChat IRC clients into sending arbitrary commands to the IRC server they are on, potentially allowing social engineering attacks, channel takeovers, and denial of service. This problem exists in versions 1.4.2 and 1.4.3. Later versions of XChat are vulnerable as well, but this behaviour is controlled by the configuration variable >>percascii<<, which defaults to 0. If it is set to 1 then the problem becomes apparent in 1.6/1.8 as well. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14936 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14936 |
title | Debian DSA-099-1 : xchat - IRC session hijacking |
Redhat
advisories |
|
References
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453
- http://marc.info/?l=bugtraq&m=101060676210255&w=2
- http://online.securityfocus.com/advisories/3806
- http://rhn.redhat.com/errata/RHSA-2002-005.html
- http://www.debian.org/security/2002/dsa-099
- http://www.securityfocus.com/bid/3830
- https://exchange.xforce.ibmcloud.com/vulnerabilities/7856