[13347] in bugtraq
Re: ICQ Buffer Overflow Exploit
daemon@ATHENA.MIT.EDU (Simon Steed)
Fri Jan 14 21:57:40 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id: <4.2.0.58.20000113203544.00d817d0@216.169.117.132>
Date: Thu, 13 Jan 2000 20:37:53 +0000
Reply-To: Simon Steed <toto@XPLOITER.COM>
From: Simon Steed <toto@XPLOITER.COM>
X-To: BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <20000111183043.8950.qmail@web2001.mail.yahoo.com>
Tested on NT4 (SP6), ICQ ver 99 beta build 3.19
Does not work. Just get the URL 404 not found (obviously :o)). ICQ
Functions as normal.
Regards
Simon
At 06:30 PM 1/11/00 , you wrote:
>Buffer Overflow in ICQ
>
>
>OS tested on: Windows 2000
>ICQ version: 99b 1.1.1.1
>
>ICQ is a very popular chat client that is affected by
>a exploitable buffer
>overflow when it parses an URL sent by another user.
Project Xploiter - Open Source Development
http://www.xploiter.com/project_xploiter/index.html
Xploit your software before it Xploits you!
ICQ UIN: 22731442