A security issue has been reported in BitchX, which can be exploited by malicious, local users to perform certain actions with escalated privileges.
The security issue is caused due to the "e_hostname()" function creating a temporary file insecurely using the "tmpnam()" function when the user issues the "HOSTNAME" or the "IRCHOST" command. This can be exploited to overwrite arbitrary files on the local system with the privileges of the user running BitchX.
The security issue is reported in version 1.1a. Other versions may also be affected.
Solution: Restrict access to trusted users only. Do not use the "HOSTNAME" and "IRCHOST" commands.
Provided and/or discovered by: Nico Golde, Debian
Original Advisory: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=449149
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org