The ssldoconnect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{ "binaries": [ { "binary_name": "xchat-gnome", "binary_version": "1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2" }, { "binary_name": "xchat-gnome-common", "binary_version": "1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2" } ], "availability": "No subscription required" }