[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

xchat 2.0.x Socks5 Vulnerability



Hi XChat users,

XChat's Socks-5 proxy code is vulnerable to a remote exploit. To
successfully exploit the code, you would need to enable socks5 
traversal (default off) and connect to the attacker's own custom
proxy server.

If you never intend to use a Socks5 proxy, you are not affected at
all by this issue.

Type of exploit:
~~~~~~~~~~~~~~~~
	Stack overflow caused by inadequate input validation. The
	attacker could take control of the User that ran the xchat
	process.


Versions affected:
~~~~~~~~~~~~~~~~~~
	From 1.8.0 to 2.0.8.


Work around:
~~~~~~~~~~~~
	Don't use socks 5 proxies.


Solution:
~~~~~~~~~
	Source code patch is available at:
		http://xchat.org/files/source/2.0/patches/
	The Fedora RPMs at www.xchat.org have been rebuilt with this
	patch applied.


Original source of code:
~~~~~~~~~~~~~~~~~~~~~~~~
	http://mail.nl.linux.org/xchat-discuss/2001-05/msg00116.html



Credit goes to tsifra for finding this bug.


-- 
Peter.

--
XChat-announce:  Xchat announcement list
Archive:         http://mail.nl.linux.org/xchat-announce/