DSA-493-1 xchat -- buffer overflow

Related Vulnerabilities: CVE-2004-0409  

A buffer overflow has been discovered in the Socks-5 proxy code of XChat, an IRC client for X similar to AmIRC. This allows an attacker to execute arbitrary code on the users' machine. For the stable distribution (woody) this problem has been fixed in version 1.8.9-0woody3. For the unstable distribution (sid) this problem has been fixed in version 2.0.8-1. We recommend that you upgrade your xchat and related packages.

Debian Security Advisory

DSA-493-1 xchat -- buffer overflow

Date Reported:
21 Apr 2004
Affected Packages:
xchat
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 244184.
In Mitre's CVE dictionary: CVE-2004-0409.
More information:

A buffer overflow has been discovered in the Socks-5 proxy code of XChat, an IRC client for X similar to AmIRC. This allows an attacker to execute arbitrary code on the users' machine.

For the stable distribution (woody) this problem has been fixed in version 1.8.9-0woody3.

For the unstable distribution (sid) this problem has been fixed in version 2.0.8-1.

We recommend that you upgrade your xchat and related packages.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3.dsc
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3.diff.gz
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/x/xchat/xchat-common_1.8.9-0woody3_all.deb
Alpha:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_alpha.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_alpha.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_arm.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_arm.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_i386.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_i386.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_ia64.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_ia64.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_hppa.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_hppa.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_m68k.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_m68k.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_mips.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_mips.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_mipsel.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_mipsel.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_powerpc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_powerpc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_s390.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_s390.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/x/xchat/xchat_1.8.9-0woody3_sparc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-gnome_1.8.9-0woody3_sparc.deb
http://security.debian.org/pool/updates/main/x/xchat/xchat-text_1.8.9-0woody3_sparc.deb

MD5 checksums of the listed files are available in the original advisory.