CVE-2002-0006

Current Description

XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.

Basic Data

PublishedJune 25, 2002
Last ModifiedOctober 10, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegetrue
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationXchatXchat1.4.2*******
    2.3ApplicationXchatXchat1.4.3*******

Vulnerable Software List

VendorProductVersions
Xchat Xchat 1.4.2, 1.4.3

References

NameSourceURLTags
CLA-2002:453http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000453CONECTIVA
20020109 xchat IRC session hijacking vulnerability (versions 1.4.1, 1.4.2)http://marc.info/?l=bugtraq&m=101060676210255&w=2BUGTRAQ
HPSBTL0201-016http://online.securityfocus.com/advisories/3806HP
RHSA-2002:005http://rhn.redhat.com/errata/RHSA-2002-005.htmlREDHAT
DSA-099http://www.debian.org/security/2002/dsa-099DEBIANPatch Vendor Advisory
3830http://www.securityfocus.com/bid/3830BID
xchat-ctcp-ping-command(7856)https://exchange.xforce.ibmcloud.com/vulnerabilities/7856XF