A flaw in the XChat's Socks-5 proxy code could allow arbitrary code
execution. To exploit this flaw an attacker would need to create a
malicious socks-5 proxy that the victim connects to.
This issue was public on Mon, 5 Apr 2004 but is LOW severity.
This will be RHSA-2004:585 as part of RHEL2.1 Update 6.
An errata has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.