Mandrake Linux Security Advisory : xchat (MDKSA-2004:036)

High Nessus Plugin ID 14135


The remote Mandrake Linux host is missing one or more security updates.


A remotely exploitable vulnerability was discovered in the Socks-5 proxy code in XChat. By default, socks5 traversal is disabled, and one would also need to connect to an attacker's own custom proxy server in order for this to be exploited. Successful exploitation could lead to arbitrary code execution as the user running XChat.

The provided packages are patched to prevent this problem.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 14135

File Name: mandrake_MDKSA-2004-036.nasl

Version: $Revision: 1.16 $

Type: local

Published: 2004/07/31

Modified: 2013/08/09

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:xchat, p-cpe:/a:mandriva:linux:xchat-perl, p-cpe:/a:mandriva:linux:xchat-python, p-cpe:/a:mandriva:linux:xchat-tcl, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2004/04/21

Reference Information

CVE: CVE-2004-0409

MDKSA: 2004:036