Red Hat: xchat SOCKSv5 proxy security issue fix
Summary
Summary
X-Chat is a graphical IRC chat client for the X Window System.A stack buffer overflow has been fixed in the SOCKSv5 proxy code.An attacker could create a malicious SOCKSv5 proxy server in such a waythat X-Chat would execute arbitrary code if a victim configured X-Chat touse the proxy. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.Users of X-Chat should upgrade to this erratum package, which contains abackported security patch, and is not vulnerable to this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
ppc:
fd3713f4b7d731c451b7d787857c1a74 xchat-2.0.4-4.EL.ppc.rpm
s390:
696feca825d882bd23a594c6016e3fd6 xchat-2.0.4-4.EL.s390.rpm
s390x:
a6f0191edb52adea9f3ae8dfd9de217c xchat-2.0.4-4.EL.s390x.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
References
Package List
Topic
An updated xchat package that fixes a stack buffer overflow in the SOCKSv5proxy code.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
Bugs Fixed