blob: 3e152a5f7b6f49bec8563f058452cbfce6a115b6 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200807-12">
<title>BitchX: Multiple vulnerabilities</title>
Multiple vulnerabilities in BitchX may allow for the remote execution of
arbitrary code or symlink attacks.
<product type="ebuild">bitchx</product>
<announced>July 21, 2008</announced>
<revised>July 21, 2008: 01</revised>
<package name="net-irc/bitchx" auto="yes" arch="*">
<vulnerable range="le">1.1-r4</vulnerable>
BitchX is an IRC client.
bannedit reported a boundary error when handling overly long IRC MODE
messages (CVE-2007-4584). Nico Golde reported an insecure creation of a
temporary file within the e_hostname() function (CVE-2007-5839).
<impact type="normal">
A remote attacker could entice a user to connect to a malicious IRC
server, resulting in the remote execution of arbitrary code with the
privileges of the user running the application. A local attacker could
perform symlink attacks to overwrite arbitrary files on the local
There is no known workaround at this time.
Since BitchX is no longer maintained, we recommend that users unmerge
the vulnerable package and switch to another IRC client:
# emerge --unmerge &quot;net-irc/bitchx&quot;</code>
<uri link="">CVE-2007-4584</uri>
<uri link="">CVE-2007-5839</uri>
<metadata tag="requester" timestamp="Mon, 07 Jul 2008 22:27:23 +0000">
<metadata tag="bugReady" timestamp="Mon, 07 Jul 2008 22:27:35 +0000">
<metadata tag="submitter" timestamp="Thu, 17 Jul 2008 11:41:45 +0000">