1 |
--------------------------------------------------------------------------- |
2 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200312-06 |
3 |
--------------------------------------------------------------------------- |
4 |
|
5 |
GLSA: 200312-06 |
6 |
Package: net-irc/xchat |
7 |
Summary: Malformed dcc send requests in xchat-2.0.6 lead to a denial of |
8 |
service |
9 |
Severity: medium |
10 |
Gentoo bug: 35623 |
11 |
Date: 2003-12-14 |
12 |
CVE: none |
13 |
Exploit: remote |
14 |
Affected: =2.0.6 |
15 |
Fixed: >=2.0.6-r1 |
16 |
|
17 |
|
18 |
DESCRIPTION: |
19 |
|
20 |
There is a remotely exploitable bug in xchat 2.0.6 that could lead to a denial |
21 |
of service attack. This is caused by sending a malformed DCC packet to xchat |
22 |
2.0.6, causing it to crash. Versions prior to 2.0.6 do not appear to be |
23 |
affected by this bug. |
24 |
|
25 |
For more information, please see: |
26 |
|
27 |
http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html |
28 |
|
29 |
|
30 |
SOLUTION: |
31 |
|
32 |
For Gentoo users, xchat-2.0.6 was marked ~arch (unstable) for most |
33 |
architectures. Since it was never marked as stable in the portage tree, only |
34 |
xchat users who have explictly added the unstable keyword to ACCEPT_KEYWORDS |
35 |
are affected. Users may updated affected machines to the patched version of |
36 |
xchat using the following commands: |
37 |
|
38 |
emerge sync |
39 |
emerge -pv '>=net-irc/xchat-2.0.6-r1' |
40 |
emerge '>=net-irc/xchat-2.0.6-r1' |
41 |
emerge clean |