[RedHat] Schwachstelle in xchat - RHSA-2004:585-01

win-sec-ssc at dfn-cert.de win-sec-ssc at dfn-cert.de
Thu Oct 28 12:55:46 CEST 2004


-----BEGIN PGP SIGNED MESSAGE-----

Liebe Kolleginnen und Kollegen,

soeben erreichte uns nachfolgendes RedHat Security Advisory. Wir geben
diese Informationen unveraendert an Sie weiter.

xchat ist ein IRC-Client fuer das X-Window System.

CAN-2004-0409 - Buffer Overflow in xchat

  Ein Buffer Overflow im Socks-5 Proxy-Code von xchat, einem IRC-Client
  fuer X-Windows kann einem entfernten Angreifer erlauben, beliebigen
  eigenen Code auf dem System des Opfers unter der Kennung des
  xchat-Nutzers auszufuehren.


Betroffen sind die folgenden Software Pakete und Plattformen:

  Paket xchat

in

  Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
  Red Hat Linux Advanced Workstation 2.1 - ia64
  Red Hat Enterprise Linux ES version 2.1 - i386
  Red Hat Enterprise Linux WS version 2.1 - i386
  Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x,
  x86_64
  Red Hat Desktop version 3 - i386, x86_64
  Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
  Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

Vom Hersteller werden ueberarbeitete Pakete zur Verfuegung gestellt.

(c) der deutschen Zusammenfassung bei DFN-CERT Services GmbH; die
Verbreitung, auch auszugsweise, ist nur unter Hinweis auf den Urheber,
DFN-CERT Services GmbH, und nur zu nicht kommerziellen Zwecken
gestattet.

Mit freundlichen Gruessen,


           Jan Kohlrausch, DFN-CERT

- --
Jan Kohlrausch (CSIRT), DFN-CERT Services GmbH
Web: https://www.dfn-cert.de/, Phone: +49-40-808077-555
PGP RSA/2048, A5DD03D1, A2 55 1C 51 0A 30 3E 78  5B 40 DA B7 14 F7 C9 E8


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Updated xchat package fixes SOCKSv5 proxy security issue
Advisory ID:       RHSA-2004:585-01
Issue date:        2004-10-27
Updated on:        2004-10-27
Product:           Red Hat Enterprise Linux
Keywords:          X-Chat
CVE Names:         CAN-2004-0409
- - ---------------------------------------------------------------------

1. Summary:

An updated xchat package that fixes a stack buffer overflow in the SOCKSv5
proxy code.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386
Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 - i386, x86_64
Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

X-Chat is a graphical IRC chat client for the X Window System.

A stack buffer overflow has been fixed in the SOCKSv5 proxy code.
An attacker could create a malicious SOCKSv5 proxy server in such a way
that X-Chat would execute arbitrary code if a victim configured X-Chat to
use the proxy.  The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2004-0409 to this issue.

Users of X-Chat should upgrade to this erratum package, which contains a
backported security patch, and is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

    http://www.redhat.com/docs/manuals/enterprise/

5. Bug IDs fixed (http://bugzilla.redhat.com/ for more info):

135238 - CAN-2004-0409 XChat buffer overflow in socks5 proxy
121333 - CAN-2004-0409 XChat buffer overflow in socks5 proxy

6. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

ia64:
39a974df6da586d236283bff42e6bb3e  xchat-1.8.9-1.21as.2.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

ia64:
39a974df6da586d236283bff42e6bb3e  xchat-1.8.9-1.21as.2.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS:
ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/xchat-1.8.9-1.21as.2.src.rpm
6d5775b3f8aad029c4d793850ad886d7  xchat-1.8.9-1.21as.2.src.rpm

i386:
903f03b6faffb88f391484b448c3f637  xchat-1.8.9-1.21as.2.i386.rpm

Red Hat Enterprise Linux AS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

ppc:
fd3713f4b7d731c451b7d787857c1a74  xchat-2.0.4-4.EL.ppc.rpm

s390:
696feca825d882bd23a594c6016e3fd6  xchat-2.0.4-4.EL.s390.rpm

s390x:
a6f0191edb52adea9f3ae8dfd9de217c  xchat-2.0.4-4.EL.s390x.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Desktop version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3desktop/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS:
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/xchat-2.0.4-4.EL.src.rpm
24dcd2f613f5d14c1f091cdfc1fdd6ca  xchat-2.0.4-4.EL.src.rpm

i386:
431bffb1410d138f3fc7ddf98668654a  xchat-2.0.4-4.EL.i386.rpm

ia64:
ad3c4335eacf54f0d1841e07d0168a49  xchat-2.0.4-4.EL.ia64.rpm

x86_64:
7398eacb0210d9b66f16c07b389dd173  xchat-2.0.4-4.EL.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key.html#package

7. References:

http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0409

8. Contact:

The Red Hat security contact is <secalert at redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact.html

Copyright 2004 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBf8BqXlSAg2UNWIIRAh9xAKC2qncgIfUgqgBXgoqrkuahLtdmpQCfcv6t
txB9W4VYt3wzwQbxgQsHQH0=
=ODms
- -----END PGP SIGNATURE-----


- -- 
Enterprise-watch-list mailing list
Enterprise-watch-list at redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (SunOS)
Comment: Processed by Mailcrypt 3.5.8 <http://mailcrypt.sourceforge.net/>

iQEVAwUBQYDPi+I9ttyl3QPRAQFiRwf/U/SZO613jhsQcrRePsKveN8JFjsowFId
TrD5u/ESuPSmlodtg5VmvUeDlwgn7QE6OdcZDTZ1RmpAJiYOwhaN+mT0fRYKdvfS
voddaldPXYt4uIVi5x5tJpcHaO+CzoXeYzIfrmlOzGmjfrYmbCB1afGbyzFxxnrp
8g/xQCWm6ARK/vAdmM0mGVBEHCIwF+ULUWYro7jP7czG/90G4ObZpOy2kccsIOvu
+9QDP+NgMYF8DHA65VS9xOcTb6KKmz9dcSNQa5swxGU0VyrS/CXS3bxh1177iqkF
AsmCm2gKEnsTWPKLADIYdCT54dikWhvfKJo3UBeRksuzoDajs1tRgQ==
=82uS
-----END PGP SIGNATURE-----




More information about the Security-Announce mailing list