XChat CTCP Ping Arbitrary Remote IRC Command Execution

medium Nessus Network Monitor Plugin ID 1875

Synopsis

The remote host is vulnerable to an flaw which allows attackers to execute arbitrary commands.

Description

The remote host is running the XChat IRC client. X-Chat versions 1.4.2 and 1.4.3 could allow a remote attacker to execute IRC commands. A remote attacker can send a specially crafted CTCP ping request to execute IRC commands on the IRC server and gain elevated privileges.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 1875

Family: IRC Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:xchat:xchat

Reference Information

CVE: CVE-2002-0006

BID: 3830