7.5
CVSSv2

CVE-2004-0409

Published: 01/06/2004 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote malicious users to execute arbitrary code.

Vulnerable Product Search on Vulmon Subscribe to Product

xchat xchat 1.8.4

xchat xchat 1.8.5

xchat xchat 1.8.6

xchat xchat 1.9.3

xchat xchat 1.9.4

xchat xchat 2.0.1

xchat xchat 2.0.2

xchat xchat 1.8.0

xchat xchat 1.8.1

xchat xchat 1.8.9

xchat xchat 1.9.0

xchat xchat 1.9.7

xchat xchat 1.9.8

xchat xchat 2.0.5

xchat xchat 2.0.6

xchat xchat 1.8.7

xchat xchat 1.8.8

xchat xchat 1.9.5

xchat xchat 1.9.6

xchat xchat 2.0.3

xchat xchat 2.0.4

xchat xchat 1.8.2

xchat xchat 1.8.3

xchat xchat 1.9.1

xchat xchat 1.9.2

xchat xchat 1.9.9

xchat xchat 2.0.0

xchat xchat 2.0.7

xchat xchat 2.0.8

Vendor Advisories

Synopsis xchat security update Type/Severity Security Advisory: Low Topic An updated xchat package that fixes a stack buffer overflow in the SOCKSv5proxy code Description X-Chat is a graphical IRC chat client for the X Window SystemA stack buffer overflow has been fixed in the SOCKSv5 pro ...
A buffer overflow has been discovered in the Socks-5 proxy code of XChat, an IRC client for X similar to AmIRC This allows an attacker to execute arbitrary code on the users' machine For the stable distribution (woody) this problem has been fixed in version 189-0woody3 For the unstable distribution (sid) this problem has been fixed in version ...

Exploits

/*[ X-Chat[v180 - v208]: socks-5 remote buffer overflow exploit ] * * * * by: vade79/v9 v9 fakehalo deadpig org (fakehalo/realhalo) * * ...