XChat did not verify that the server hostname matched the domain name in the subject's Common Name (CN) or subjectAltName field in X.509 certificates. This could allow a man-in-the-middle attacker to spoof an SSL server if they had a certificate that was valid for any domain name.
Red Hat would like to thank Nicholas Bebout for reporting this issue.
This was fixed in hexchat this past November:
It was originally reported in April 2013:
I'm not sure if that means it should have a 2013 CVE or a 2014 one. I am requesting one on oss-security.
Also, upstream XChat is no longer in active development.
Created xchat tracking bugs for this issue:
Affects: fedora-all [bug 1187322]