Mandrake Linux Security Advisory : xchat (MDKSA-2002:006)

High Nessus Plugin ID 13914


The remote Mandrake Linux host is missing a security update.


zen-parse discovered a problem in versions 1.4.2 and 1.4.3 of xchat that could allow a malicious user to send commands to the IRC server they are on which would take advantage of the CTCP PING reply handler in xchat. This could be used for denial of service, channel takeovers, and other similar attacks. The problem exists in 1.6 and 1.8 versions, however it is controlled by the 'percascii' variable which defaults to 0. It 'percascii' is set to 1, the problem is exploitable. This vulnerability has been fixed upstream in version 1.8.7.


Update the affected xchat package.

Plugin Details

Severity: High

ID: 13914

File Name: mandrake_MDKSA-2002-006.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2004/07/31

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:xchat, cpe:/o:mandrakesoft:mandrake_linux:7.1, cpe:/o:mandrakesoft:mandrake_linux:7.2, cpe:/o:mandrakesoft:mandrake_linux:8.0, cpe:/o:mandrakesoft:mandrake_linux:8.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2002/01/17

Reference Information

MDKSA: 2002:006