The ssldoconnect function in common/server.c in HexChat before 2.10.2, XChat, and XChat-GNOME does not verify that the server hostname matches a domain name in the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
{
"binaries": [
{
"binary_version": "1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2",
"binary_name": "xchat-gnome"
},
{
"binary_version": "1:0.30.0~git20131003.d20b8d+really20110821-0.2ubuntu12.2",
"binary_name": "xchat-gnome-common"
}
],
"availability": "No subscription required"
}