From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-200312-06.xml | 66 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) create mode 100644 glsa-200312-06.xml (limited to 'glsa-200312-06.xml') diff --git a/glsa-200312-06.xml b/glsa-200312-06.xml new file mode 100644 index 00000000..1d0ba5e2 --- /dev/null +++ b/glsa-200312-06.xml @@ -0,0 +1,66 @@ + + + + + + + XChat: malformed dcc send request denial of service + + A bug in XChat could allow malformed dcc send requests to cause a denial of + service. + + xchat + 2003-12-14 + 2003-12-14: 01 + 35623 + remote + + + 2.0.6-r1 + 2.0.6 + + + +

+ XChat is a multiplatform IRC client. +

+
+ +

+ There is a remotely exploitable bug in XChat 2.0.6 that could lead to a + denial of service attack. Gentoo wishes to thank lloydbates for discovering + this bug, as well as jcdutton and rac for submitting patches to fix the bug. +

+
+ +

+ A malformed DCC packet sent by a remote attacker can cause XChat to crash. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ For Gentoo users, xchat-2.0.6 was marked ~arch (unstable) for most + architectures. Since it was never marked as stable in the portage tree, + only xchat users who have explictly added the unstable keyword to + ACCEPT_KEYWORDS are affected. Users may updated affected machines to the + patched version of xchat using the following commands: +

+ + # emerge sync + # emerge -pv '>=net-irc/xchat-2.0.6-r1' + # emerge '>=net-irc/xchat-2.0.6-r1' + # emerge clean +

+ This assumes that users are running with ACCEPT_KEYWORDS enabled for their + architecture. +

+
+ + XChat Announcement + +
-- cgit v1.2.3-65-gdbad