Multiple vulnerabilities in BitchX may allow for the remote execution of arbitrary code or symlink attacks.
|Package||net-irc/bitchx on all architectures|
|Affected versions||<= 1.1-r4|
BitchX is an IRC client.
bannedit reported a boundary error when handling overly long IRC MODE messages (CVE-2007-4584). Nico Golde reported an insecure creation of a temporary file within the e_hostname() function (CVE-2007-5839).
A remote attacker could entice a user to connect to a malicious IRC server, resulting in the remote execution of arbitrary code with the privileges of the user running the application. A local attacker could perform symlink attacks to overwrite arbitrary files on the local machine.
There is no known workaround at this time.
Since BitchX is no longer maintained, we recommend that users unmerge the vulnerable package and switch to another IRC client:
# emerge --unmerge "net-irc/bitchx"
July 21, 2008
July 21, 2008: 01