A remotely exploitable buffer overrun was reported in XChat.
This issue exists in the SOCKS 5 proxy code.
This stack-based buffer overrun could be exploited by a malicious proxy server
if SOCKS 5 traversal has been enabled in the client. Successful exploitation
will result in execution of arbitrary code as the client user.
It should be noted that SOCKS 5 traversal is not enabled by default
and this issue only poses a risk if the victim user deliberately connects
to an attacker's SOCKS 5 proxy server.
-- Version not vulnerable: X-Chat 2.0.8 -r1