Gentoo Archives: gentoo-announce

From: Kurt Lieber <klieber@g.o>
To: gentoo-announce@g.o
Subject: [gentoo-announce] GLSA: Malformed dcc send requests in xchat-2.0.6 lead to a denial of service
Date: Mon, 15 Dec 2003 07:20:34
Message-Id: 20031215131230.GO6559@mail.lieber.org
1 ---------------------------------------------------------------------------
2 GENTOO LINUX SECURITY ANNOUNCEMENT 200312-06
3 ---------------------------------------------------------------------------
4
5 GLSA: 200312-06
6 Package: net-irc/xchat
7 Summary: Malformed dcc send requests in xchat-2.0.6 lead to a denial of
8 service
9 Severity: medium
10 Gentoo bug: 35623
11 Date: 2003-12-14
12 CVE: none
13 Exploit: remote
14 Affected: =2.0.6
15 Fixed: >=2.0.6-r1
16
17
18 DESCRIPTION:
19
20 There is a remotely exploitable bug in xchat 2.0.6 that could lead to a denial
21 of service attack. This is caused by sending a malformed DCC packet to xchat
22 2.0.6, causing it to crash. Versions prior to 2.0.6 do not appear to be
23 affected by this bug.
24
25 For more information, please see:
26
27 http://mail.nl.linux.org/xchat-announce/2003-12/msg00000.html
28
29
30 SOLUTION:
31
32 For Gentoo users, xchat-2.0.6 was marked ~arch (unstable) for most
33 architectures. Since it was never marked as stable in the portage tree, only
34 xchat users who have explictly added the unstable keyword to ACCEPT_KEYWORDS
35 are affected. Users may updated affected machines to the patched version of
36 xchat using the following commands:
37
38 emerge sync
39 emerge -pv '>=net-irc/xchat-2.0.6-r1'
40 emerge '>=net-irc/xchat-2.0.6-r1'
41 emerge clean