Vulnerability Name:

CVE-2004-0409 (CCN-15903)

Assigned:2004-04-05
Published:2004-04-05
Updated:2017-10-11
Summary:Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2004-0409

Source: CCN
Type: XChat-Announce Mailing List, Mon, 5 Apr 2004 17:13:05 +1000
xchat 2.0.x Socks5 Vulnerability

Source: MLIST
Type: Patch, Vendor Advisory
[xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability

Source: CCN
Type: RHSA-2004-177
An updated X-Chat package fixes vulnerability in Socks-5 proxy

Source: CCN
Type: RHSA-2004-585
xchat security update

Source: GENTOO
Type: UNKNOWN
GLSA-200404-15

Source: DEBIAN
Type: DSA-493
xchat -- buffer overflow

Source: FEDORA
Type: UNKNOWN
FLSA:123013

Source: CCN
Type: GLSA-200404-15
XChat 2.0.x SOCKS5 Vulnerability

Source: CCN
Type: GLSA 200404-15
XChat 2.0.x SOCKS5 Vulnerability

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2004:177

Source: REDHAT
Type: UNKNOWN
RHSA-2004:585

Source: CCN
Type: BID-10168
XChat SOCKS 5 Remote Buffer Overrun Vulnerability

Source: CCN
Type: Fedora Legacy Update Advisory ID: FLSA:123013
Updated xchat package fixes security issue

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.xchat.org/

Source: CCN
Type: Xchat Web site
Xchat

Source: XF
Type: UNKNOWN
xchat-socks5-bo(15903)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11312

Source: DEBIAN
Type: UNKNOWN
DSA-493

Vulnerable Configuration:Configuration 1:
  • cpe:/a:xchat:xchat:1.8.0:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.1:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.2:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.3:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.4:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.5:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.6:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.7:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.8.9:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.4:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.5:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.6:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.7:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.8:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:1.9.9:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:xchat:xchat:2.0.8:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040409
    V
    CVE-2004-0409
    2015-11-16
    oval:org.mitre.oval:def:11312
    V
    Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code.
    2013-04-29
    oval:com.redhat.rhsa:def:20040585
    P
    RHSA-2004:585: xchat security update (Low)
    2004-10-27
    oval:org.debian:def:493
    V
    buffer overflow
    2004-04-21
    BACK
    xchat xchat 1.8.0
    xchat xchat 1.8.1
    xchat xchat 1.8.2
    xchat xchat 1.8.3
    xchat xchat 1.8.4
    xchat xchat 1.8.5
    xchat xchat 1.8.6
    xchat xchat 1.8.7
    xchat xchat 1.8.8
    xchat xchat 1.8.9
    xchat xchat 1.9.0
    xchat xchat 1.9.1
    xchat xchat 1.9.2
    xchat xchat 1.9.3
    xchat xchat 1.9.4
    xchat xchat 1.9.5
    xchat xchat 1.9.6
    xchat xchat 1.9.7
    xchat xchat 1.9.8
    xchat xchat 1.9.9
    xchat xchat 2.0.0
    xchat xchat 2.0.1
    xchat xchat 2.0.2
    xchat xchat 2.0.3
    xchat xchat 2.0.4
    xchat xchat 2.0.5
    xchat xchat 2.0.6
    xchat xchat 2.0.7
    xchat xchat 2.0.8