BitchX: Multiple vulnerabilities
Gentoo Linux Security Advisory
||GLSA 200807-12 / bitchx
||July 21, 2008
||July 21, 2008: 01
All supported architectures
Multiple vulnerabilities in BitchX may allow for the remote execution of
arbitrary code or symlink attacks.
BitchX is an IRC client.
bannedit reported a boundary error when handling overly long IRC MODE
messages (CVE-2007-4584). Nico Golde reported an insecure creation of a
temporary file within the e_hostname() function (CVE-2007-5839).
A remote attacker could entice a user to connect to a malicious IRC
server, resulting in the remote execution of arbitrary code with the
privileges of the user running the application. A local attacker could
perform symlink attacks to overwrite arbitrary files on the local
There is no known workaround at this time.
Since BitchX is no longer maintained, we recommend that users unmerge
the vulnerable package and switch to another IRC client:
Code Listing 3.1: Resolution
# emerge --unmerge "net-irc/bitchx"