Home page logo

bugtraq logo Bugtraq mailing list archives

Re: Buffer overflow in mIRC allowing arbitary code to be executed.
From: Kevin Day <toasty () temphost dragondata com>
Date: Mon, 4 Feb 2002 19:18:23 -0600 (CST)

General Info
Researched by: James Martin
Full advisory: http://www.uuuppz.com/research/adv-001-mirc.htm
Exploit: Proof of concept code available at above URL.

Product: mIRC
Website: http://www.mirc.com
Version: 5.91 and all prior versions (to be best of my knowledge).
Fix: A patch will be available soon from offical mIRC sites.
     Please do not download from unofficial sites, as you may download
     a trojaned version.

Type: Buffer Overrun
Risk: High

mIRC 6.0 was released on Sunday, which corrects this issue.

-- Kevin Day

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]