---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated xchat package fixes SOCKSv5 proxy security issue
Advisory ID:       RHSA-2004:585-01
Issue date:        2004-10-27
Updated on:        2004-10-27
Product:           Red Hat Enterprise Linux
Keywords:          X-Chat
CVE Names:         CAN-2004-0409
---------------------------------------------------------------------

1. Summary:

An updated xchat package that fixes a stack buffer overflow in the SOCKSv5
proxy code.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

X-Chat is a graphical IRC chat client for the X Window System.

A stack buffer overflow has been fixed in the SOCKSv5 proxy code.
An attacker could create a malicious SOCKSv5 proxy server in such a way
that X-Chat would execute arbitrary code if a victim configured X-Chat to
use the proxy.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.

Users of X-Chat should upgrade to this erratum package, which contains a
backported security patch, and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed  (http://bugzilla.redhat.com/ for more info):

135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 

6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

ia64:
39a974df6da586d236283bff42e6bb3e  xchat-1.8.9-1.21as.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 

6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

ia64:
39a974df6da586d236283bff42e6bb3e  xchat-1.8.9-1.21as.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 

6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 

6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS: 

24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

ppc:
fd3713f4b7d731c451b7d787857c1a74  xchat-2.0.4-4.EL.ppc.rpm

s390:
696feca825d882bd23a594c6016e3fd6  xchat-2.0.4-4.EL.s390.rpm

s390x:
a6f0191edb52adea9f3ae8dfd9de217c  xchat-2.0.4-4.EL.s390x.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS: 

24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: 

24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: 

24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
 

7. References:
 
  
CVE -CVE-2004-0409

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: xchat SOCKSv5 proxy security issue fix

An updated xchat package that fixes a stack buffer overflow in the SOCKSv5 proxy code.

Summary



Summary

X-Chat is a graphical IRC chat client for the X Window System.A stack buffer overflow has been fixed in the SOCKSv5 proxy code.An attacker could create a malicious SOCKSv5 proxy server in such a waythat X-Chat would execute arbitrary code if a victim configured X-Chat touse the proxy. The Common Vulnerabilities and Exposures project(cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.Users of X-Chat should upgrade to this erratum package, which contains abackported security patch, and is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):
135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy 121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
6. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
ia64: 39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
ia64: 39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm
i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm
Red Hat Enterprise Linux AS version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
ppc: fd3713f4b7d731c451b7d787857c1a74 xchat-2.0.4-4.EL.ppc.rpm
s390: 696feca825d882bd23a594c6016e3fd6 xchat-2.0.4-4.EL.s390.rpm
s390x: a6f0191edb52adea9f3ae8dfd9de217c xchat-2.0.4-4.EL.s390x.rpm
x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Desktop version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux ES version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
Red Hat Enterprise Linux WS version 3:
SRPMS:
24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm
i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm
ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm
x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

References

Package List


Severity
Advisory ID: RHSA-2004:585-01
Issued Date: : 2004-10-27
Updated on: 2004-10-27
Product: Red Hat Enterprise Linux
Keywords: X-Chat
CVE Names: CAN-2004-0409

Topic

An updated xchat package that fixes a stack buffer overflow in the SOCKSv5proxy code.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64

Red Hat Desktop version 3 - i386, x86_64

Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64

Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64


Bugs Fixed


Related News