openbsd-ports/net/xchat/patches
brad b0ed136e82 XChat's Socks-5 proxy code is vulnerable to a remote exploit. To
successfully exploit the code, you would need to enable socks5
traversal (default off) and connect to the attacker's own custom
proxy server.

If you never intend to use a Socks5 proxy, you are not affected at
all by this issue.

http://mail.nl.linux.org/xchat-announce/2004-04/msg00000.html

ok pvalchev@
2004-08-14 19:16:44 +00:00
..
patch-src_common_outbound_c final round: 2002-12-30 09:15:26 +00:00
patch-src_common_server_c XChat's Socks-5 proxy code is vulnerable to a remote exploit. To 2004-08-14 19:16:44 +00:00
patch-src_fe-gtk_Makefile_in I don't know how shell@ managed to do this but the patch for 2003-05-30 15:34:45 +00:00
patch-src_fe-gtk_xtext_c add patch from main stream, bump PKGNAME 2003-08-02 14:36:50 +00:00
patch-src_fe-text_Makefile_in I don't know how shell@ managed to do this but the patch for 2003-05-30 15:34:45 +00:00