First published: Wed Jan 18 2017(Updated: )
Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HexChat | =2.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2233 has a high severity rating due to its potential to cause denial of service.
To fix CVE-2016-2233, update HexChat to version 2.11.0 or later.
The impact of CVE-2016-2233 on HexChat includes crashes when processing malicious CAP LS messages from remote servers.
CVE-2016-2233 specifically affects HexChat version 2.10.2.
There is no official workaround for CVE-2016-2233; upgrading to a patched version is recommended.