An updated xchat package is available for Red Hat Enterprise Linux 2.1 and 3
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated xchat package fixes SOCKSv5 proxy security issue
Advisory ID: RHSA-2004:585-01
Issue date: 2004-10-27
Updated on: 2004-10-27
Product: Red Hat Enterprise Linux
Keywords: X-Chat
CVE Names: CAN-2004-0409
----------------------------------------------------------------------
1. Summary:
An updated xchat package that fixes a stack buffer overflow in the SOCKSv5 proxy code.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
X-Chat is a graphical IRC chat client for the X Window System.
A stack buffer overflow has been fixed in the SOCKSv5 proxy code. An attacker could create a malicious SOCKSv5 proxy server in such a way that X-Chat would execute arbitrary code if a victim configured X-Chat to use the proxy. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.
Users of X-Chat should upgrade to this erratum package, which contains a backported security patch, and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
ppc:
fd3713f4b7d731c451b7d787857c1a74 xchat-2.0.4-4.EL.ppc.rpm
s390:
696feca825d882bd23a594c6016e3fd6 xchat-2.0.4-4.EL.s390.rpm
s390x:
a6f0191edb52adea9f3ae8dfd9de217c xchat-2.0.4-4.EL.s390x.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package
7. References:
http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0409
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.
----------------------------------------------------------------------
Red Hat Security Advisory
Synopsis: Updated xchat package fixes SOCKSv5 proxy security issue
Advisory ID: RHSA-2004:585-01
Issue date: 2004-10-27
Updated on: 2004-10-27
Product: Red Hat Enterprise Linux
Keywords: X-Chat
CVE Names: CAN-2004-0409
----------------------------------------------------------------------
1. Summary:
An updated xchat package that fixes a stack buffer overflow in the SOCKSv5 proxy code.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64
3. Problem description:
X-Chat is a graphical IRC chat client for the X Window System.
A stack buffer overflow has been fixed in the SOCKSv5 proxy code. An attacker could create a malicious SOCKSv5 proxy server in such a way that X-Chat would execute arbitrary code if a victim configured X-Chat to use the proxy. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.
Users of X-Chat should upgrade to this erratum package, which contains a backported security patch, and is not vulnerable to this issue.
4. Solution:
Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
ia64:
39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386:
903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
ppc:
fd3713f4b7d731c451b7d787857c1a74 xchat-2.0.4-4.EL.ppc.rpm
s390:
696feca825d882bd23a594c6016e3fd6 xchat-2.0.4-4.EL.s390.rpm
s390x:
a6f0191edb52adea9f3ae8dfd9de217c xchat-2.0.4-4.EL.s390x.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386:
431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64:
ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64:
7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package
7. References:
http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0409
8. Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://www.redhat.com/security/team/contact.html
Copyright 2004 Red Hat, Inc.