Bugzilla – Bug 1020738
VUL-1: CVE-2016-2233: hexchat: Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.cin
Last modified: 2020-05-12 13:55:31 UTC
Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message. Exploit at https://packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2233 https://www.exploit-db.com/exploits/39657/ http://packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html
No patch found upstream for this issue.
bugbot adjusting priority
Adjust rating. Requires connection to a malicious server. VUL-1
https://github.com/hexchat/hexchat/issues/1934
https://github.com/hexchat/hexchat/commit/4e061a43b3453a9856d34250c3913175c45afe9d
Fixed in v2.12.4, v2.12.0 SUSE:SLE-12-SP1:Update/hexchat affected SUSE:SLE-12-SP2:Update/hexchat not affected openSUSE:Leap:42.1:Update affected openSUSE:Leap:42.2:Update not affected
bug would trigger fortify overflow checker if encountered.
This is an autogenerated message for OBS integration: This bug (1020738) was mentioned in https://build.opensuse.org/request/show/461766 42.1 / hexchat
fixed
please don't close security bugs. Assign them to security-team@suse.de once you're done
SLE12 and SLE15 ship an already fixed version. Closing
(In reply to Alexandros Toptsoglou from comment #13) > SLE12 and SLE15 ship an already fixed version. Closing Correction: SLE12-SP2 and SLE15 ship an already fixed version. SLE12 is EOL.