A flaw in the XChat's Socks-5 proxy code could allow arbitrary code execution. To exploit this flaw an attacker would need to create a malicious socks-5 proxy that the victim connects to. CAN-2004-0409 Affects: 3AS 3ES 3WS CAN-2004-0409 Affects: 2.1AS 2.1AW 2.1ES 2.1WS This issue was public on Mon, 5 Apr 2004
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2004-0409 links to http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html for more information. "XChat's Socks-5 proxy code is vulnerable to a remote exploit. To successfully exploit the code, you would need to enable socks5 traversal (default off) and connect to the attacker's own custom proxy server. "If you never intend to use a Socks5 proxy, you are not affected at all by this issue."
This will be RHSA-2004:297.
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-585.html
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2004-297.html