How to Buy
This script is Copyright (C) 2004-2014 Tenable Network Security, Inc.
The remote Red Hat host is missing a security update.
An updated xchat package that fixes a stack-based buffer overflow in
the SOCKSv5 proxy code.
X-Chat is a graphical IRC chat client for the X Window System.
A stack-based buffer overflow has been fixed in the SOCKSv5 proxy
code. An attacker could create a malicious SOCKSv5 proxy server in
such a way that X-Chat would execute arbitrary code if a victim
configured X-Chat to use the proxy. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0409
to this issue.
Users of X-Chat should upgrade to this erratum package, which contains
a backported security patch, and is not vulnerable to this issue.
See also :
Update the affected xchat package.
Risk factor :
High / CVSS Base Score : 7.5
Family: Red Hat Local Security Checks
Nessus Plugin ID: 15633 ()
CVE ID: CVE-2004-0409
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.