Vulnerability Name: | CVE-2004-0409 (CCN-15903) | ||||||||||||||||||||
Assigned: | 2004-04-05 | ||||||||||||||||||||
Published: | 2004-04-05 | ||||||||||||||||||||
Updated: | 2017-10-11 | ||||||||||||||||||||
Summary: | Stack-based buffer overflow in the Socks-5 proxy code for XChat 1.8.0 to 2.0.8, with socks5 traversal enabled, allows remote attackers to execute arbitrary code. | ||||||||||||||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-Other | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2004-0409 Source: CCN Type: XChat-Announce Mailing List, Mon, 5 Apr 2004 17:13:05 +1000 xchat 2.0.x Socks5 Vulnerability Source: MLIST Type: Patch, Vendor Advisory [xchat-announce] 20040405 xchat 2.0.x Socks5 Vulnerability Source: CCN Type: RHSA-2004-177 An updated X-Chat package fixes vulnerability in Socks-5 proxy Source: CCN Type: RHSA-2004-585 xchat security update Source: GENTOO Type: UNKNOWN GLSA-200404-15 Source: DEBIAN Type: DSA-493 xchat -- buffer overflow Source: FEDORA Type: UNKNOWN FLSA:123013 Source: CCN Type: GLSA-200404-15 XChat 2.0.x SOCKS5 Vulnerability Source: CCN Type: GLSA 200404-15 XChat 2.0.x SOCKS5 Vulnerability Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:177 Source: REDHAT Type: UNKNOWN RHSA-2004:585 Source: CCN Type: BID-10168 XChat SOCKS 5 Remote Buffer Overrun Vulnerability Source: CCN Type: Fedora Legacy Update Advisory ID: FLSA:123013 Updated xchat package fixes security issue Source: CONFIRM Type: Patch, Vendor Advisory http://www.xchat.org/ Source: CCN Type: Xchat Web site Xchat Source: XF Type: UNKNOWN xchat-socks5-bo(15903) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:11312 Source: DEBIAN Type: UNKNOWN DSA-493 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration RedHat 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |