XChat versions 2.0.8 through 1.8.0 are vulnerable to a boundary error condition in their SOCKS-5 proxy code. Successful exploitation can lead to a complete system compromise.
d5f20b76db2c8dc08bf4e18ba72b64835cbb45e7648c299108cb57c4fec1bc1e
<!-- MHonArc v2.6.8 -->
<!--X-Subject: xchat 2.0.x Socks5 Vulnerability -->
<!--X-From-R13: Brgre Lryrmal <mrqNkpung.bet> -->
<!--X-Date: Mon, 05 Apr 2004 09:12:28 +0200 -->
<!--X-Message-Id: 20040405171305.04f19c44.zed@xchat.org -->
<!--X-Content-Type: text/plain -->
<!--X-Head-End-->
<!doctype html public "-//W3C//DTD HTML//EN">
<html>
<head>
<title>xchat 2.0.x Socks5 Vulnerability</title>
</head>
<body>
<!--X-Body-Begin-->
<!--X-User-Header-->
<!--X-User-Header-End-->
<!--X-TopPNI-->
<hr>
[Date Prev][Date Next][Thread Prev][Thread Next][<a href="maillist.html#00000">Date Index</a>][<a href="index.html#00000">Thread Index</a>]
<!--X-TopPNI-End-->
<!--X-MsgBody-->
<!--X-Subject-Header-Begin-->
<h1>xchat 2.0.x Socks5 Vulnerability</h1>
<hr>
<!--X-Subject-Header-End-->
<!--X-Head-of-Message-->
<ul>
<li><em>To</em>: <a href="mailto:xchat-announce@DOMAIN.HIDDEN">xchat-announce@xxxxxxxxxxxx</a></li>
<li><em>Subject</em>: xchat 2.0.x Socks5 Vulnerability</li>
<li><em>From</em>: Peter Zelezny <<a href="mailto:zed@DOMAIN.HIDDEN">zed@xxxxxxxxx</a>></li>
<li><em>Date</em>: Mon, 5 Apr 2004 17:13:05 +1000</li>
<li><em>List-archive</em>: <<a href="http://mail.nl.linux.org/xchat-announce/">http://mail.nl.linux.org/xchat-announce/</a>></li>
<li><em>List-help</em>: <<a href="mailto:ecartis@nl.linux.org?Subject=help">mailto:ecartis@nl.linux.org?Subject=help</a>></li>
<li><em>List-id</em>: <xchat-announce.nl.linux.org></li>
<li><em>List-owner</em>: <<a href="mailto:riel@nl.linux.org">mailto:riel@nl.linux.org</a>></li>
<li><em>List-post</em>: <<a href="mailto:xchat-announce@nl.linux.org">mailto:xchat-announce@nl.linux.org</a>></li>
<li><em>List-software</em>: Ecartis version 1.0.0</li>
<li><em>List-subscribe</em>: <<a href="mailto:xchat-announce-request@nl.linux.org?Subject=subscribe">mailto:xchat-announce-request@nl.linux.org?Subject=subscribe</a>></li>
<li><em>List-unsubscribe</em>: <<a href="mailto:xchat-announce-request@nl.linux.org?Subject=unsubscribe">mailto:xchat-announce-request@nl.linux.org?Subject=unsubscribe</a>></li>
<li><em>Reply-to</em>: <a href="mailto:xchat-discuss@DOMAIN.HIDDEN">xchat-discuss@xxxxxxxxxxxx</a></li>
<li><em>Sender</em>: <a href="mailto:xchat-announce-bounce@DOMAIN.HIDDEN">xchat-announce-bounce@xxxxxxxxxxxx</a></li>
</ul>
<!--X-Head-of-Message-End-->
<!--X-Head-Body-Sep-Begin-->
<hr>
<!--X-Head-Body-Sep-End-->
<!--X-Body-of-Message-->
<pre>
Hi XChat users,
XChat's Socks-5 proxy code is vulnerable to a remote exploit. To
successfully exploit the code, you would need to enable socks5
traversal (default off) and connect to the attacker's own custom
proxy server.
If you never intend to use a Socks5 proxy, you are not affected at
all by this issue.
Type of exploit:
~~~~~~~~~~~~~~~~
Stack overflow caused by inadequate input validation. The
attacker could take control of the User that ran the xchat
process.
Versions affected:
~~~~~~~~~~~~~~~~~~
From 1.8.0 to 2.0.8.
Work around:
~~~~~~~~~~~~
Don't use socks 5 proxies.
Solution:
~~~~~~~~~
Source code patch is available at:
<a href="http://xchat.org/files/source/2.0/patches/">http://xchat.org/files/source/2.0/patches/</a>
The Fedora RPMs at www.xchat.org have been rebuilt with this
patch applied.
Original source of code:
~~~~~~~~~~~~~~~~~~~~~~~~
<a href="http://mail.nl.linux.org/xchat-discuss/2001-05/msg00116.html">http://mail.nl.linux.org/xchat-discuss/2001-05/msg00116.html</a>
Credit goes to tsifra for finding this bug.
--
Peter.
--
XChat-announce: Xchat announcement list
Archive: <a href="http://mail.nl.linux.org/xchat-announce/">http://mail.nl.linux.org/xchat-announce/</a>
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Index(es):
<ul>
<li><a href="maillist.html#00000"><strong>Date</strong></a></li>
<li><a href="index.html#00000"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>