CVE-2013-7449

NameCVE-2013-7449
DescriptionThe ssl_do_connect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs776609, 818009, 829730

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
hexchat (PTS)jessie2.10.1-1+deb8u2fixed
stretch2.12.4-3fixed
buster2.14.2-4fixed
bullseye2.14.3-6+deb11u1fixed
bookworm2.16.1-1fixed
sid, trixie2.16.2-1fixed
xchat (PTS)jessie2.8.8-7.3vulnerable
buster2.8.8-17fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
hexchatsourcejessie2.10.1-1+deb8u1
hexchatsource(unstable)2.10.2-1818009
xchatsource(unstable)2.8.8-10776609
xchat-gnomesource(unstable)(unfixed)829730

Notes

[jessie] - xchat <no-dsa> (Minor issue)
[wheezy] - xchat <no-dsa> (Minor issue)
[squeeze] - xchat <no-dsa> (Minor issue)
[wheezy] - xchat-gnome <no-dsa> (Minor issue)
[squeeze] - xchat-gnome <no-dsa> (Minor issue)
https://github.com/hexchat/hexchat/issues/524
https://github.com/hexchat/hexchat/commit/c9b63f7f9be01692b03fa15275135a4910a7e02d (v2.12.0)
https://github.com/hexchat/hexchat/commit/c99f2ba645d1f4d01d6d2bb0cc1238825e15c604 (v2.10.2)

Search for package or bug name: Reporting problems