User: Password:
|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2004:585-01 (xchat)

From:  bugzilla@redhat.com
To:  enterprise-watch-list@redhat.com
Subject:  [RHSA-2004:585-01] Updated xchat package fixes SOCKSv5 proxy security issue
Date:  Wed, 27 Oct 2004 11:37 -0400

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - --------------------------------------------------------------------- Red Hat Security Advisory Synopsis: Updated xchat package fixes SOCKSv5 proxy security issue Advisory ID: RHSA-2004:585-01 Issue date: 2004-10-27 Updated on: 2004-10-27 Product: Red Hat Enterprise Linux Keywords: X-Chat CVE Names: CAN-2004-0409 - --------------------------------------------------------------------- 1. Summary: An updated xchat package that fixes a stack buffer overflow in the SOCKSv5 proxy code. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Problem description: X-Chat is a graphical IRC chat client for the X Window System. A stack buffer overflow has been fixed in the SOCKSv5 proxy code. An attacker could create a malicious SOCKSv5 proxy server in such a way that X-Chat would execute arbitrary code if a victim configured X-Chat to use the proxy. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0409 to this issue. Users of X-Chat should upgrade to this erratum package, which contains a backported security patch, and is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info): 135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy 121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy 6. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/xch... 6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm ia64: 39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/xch... 6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm ia64: 39a974df6da586d236283bff42e6bb3e xchat-1.8.9-1.21as.2.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/xch... 6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/xch... 6d5775b3f8aad029c4d793850ad886d7 xchat-1.8.9-1.21as.2.src.rpm i386: 903f03b6faffb88f391484b448c3f637 xchat-1.8.9-1.21as.2.i386.rpm Red Hat Enterprise Linux AS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xchat... 24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm ppc: fd3713f4b7d731c451b7d787857c1a74 xchat-2.0.4-4.EL.ppc.rpm s390: 696feca825d882bd23a594c6016e3fd6 xchat-2.0.4-4.EL.s390.rpm s390x: a6f0191edb52adea9f3ae8dfd9de217c xchat-2.0.4-4.EL.s390x.rpm x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm Red Hat Desktop version 3: SRPMS: ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/... 24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm Red Hat Enterprise Linux ES version 3: SRPMS: ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xchat... 24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm Red Hat Enterprise Linux WS version 3: SRPMS: ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xchat... 24dcd2f613f5d14c1f091cdfc1fdd6ca xchat-2.0.4-4.EL.src.rpm i386: 431bffb1410d138f3fc7ddf98668654a xchat-2.0.4-4.EL.i386.rpm ia64: ad3c4335eacf54f0d1841e07d0168a49 xchat-2.0.4-4.EL.ia64.rpm x86_64: 7398eacb0210d9b66f16c07b389dd173 xchat-2.0.4-4.EL.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package 7. References: http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.... http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0409 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://www.redhat.com/security/team/contact.html Copyright 2004 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBf8BqXlSAg2UNWIIRAh9xAKC2qncgIfUgqgBXgoqrkuahLtdmpQCfcv6t txB9W4VYt3wzwQbxgQsHQH0= =ODms -----END PGP SIGNATURE----- -- Enterprise-watch-list mailing list Enterprise-watch-list@redhat.com https://www.redhat.com/mailman/listinfo/enterprise-watch-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds