CVE-2016-2233

Published on: 01/18/2017 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:15 PM UTC

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Certain versions of Hexchat from Hexchat Project contain the following vulnerability:

Stack-based buffer overflow in the inbound_cap_ls function in common/inbound.c in HexChat 2.10.2 allows remote IRC servers to cause a denial of service (crash) via a large number of options in a CAP LS message.

  • CVE-2016-2233 has been assigned by [email protected] to track the vulnerability - currently rated as HIGH severity.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 5 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Hexchat IRC Client 2.11.0 CAP LS Handling Buffer Overflow ≈ Packet Storm Exploit
Third Party Advisory
VDB Entry
packetstormsecurity.com
text/html
URL Logo MISC packetstormsecurity.com/files/136563/Hexchat-IRC-Client-2.11.0-CAP-LS-Handling-Buffer-Overflow.html
HexChat CVE-2016-2233 Stack-Based Buffer Overflow Vulnerability cve.report (archive)
text/html
URL Logo BID 95920
Hexchat IRC Client 2.11.0 - CAP LS Handling Buffer Overflow Exploit
Third Party Advisory
VDB Entry
www.exploit-db.com
Proof of Concept
text/html
URL Logo EXPLOIT-DB 39657

Exploit/POC from Github

This is an exploitation guide for CVE-2016-2233

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationHexchat ProjectHexchat2.10.2AllAllAll
ApplicationHexchat ProjectHexchat2.10.2AllAllAll
  • cpe:2.3:a:hexchat_project:hexchat:2.10.2:*:*:*:*:*:*:*:
  • cpe:2.3:a:hexchat_project:hexchat:2.10.2:*:*:*:*:*:*:*: