First published: Fri Mar 28 2014(Updated: )
The ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/hexchat | <2.10.2 | 2.10.2 |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
XChat | ||
XChat | ||
HexChat | <=2.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7449 is considered a high severity vulnerability due to its potential to enable man-in-the-middle attacks.
To fix CVE-2013-7449, update HexChat to version 2.10.2 or later, or ensure compliance with XChat or XChat-GNOME's latest secure versions.
CVE-2013-7449 affects HexChat versions prior to 2.10.2, as well as XChat and XChat-GNOME without proper hostname verification.
Yes, CVE-2013-7449 allows man-in-the-middle attackers to spoof SSL servers through arbitrary valid certificates.
Issues related to CVE-2013-7449 can be reported in the respective projects' issue trackers or on relevant bug report platforms.