[13347] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ICQ Buffer Overflow Exploit

daemon@ATHENA.MIT.EDU (Simon Steed)
Fri Jan 14 21:57:40 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
Message-Id:  <4.2.0.58.20000113203544.00d817d0@216.169.117.132>
Date:         Thu, 13 Jan 2000 20:37:53 +0000
Reply-To: Simon Steed <toto@XPLOITER.COM>
From: Simon Steed <toto@XPLOITER.COM>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <20000111183043.8950.qmail@web2001.mail.yahoo.com>

Tested on NT4 (SP6), ICQ ver 99 beta build 3.19

Does not work. Just get the URL 404 not found (obviously :o)). ICQ
Functions as normal.

Regards

Simon

At 06:30 PM 1/11/00 , you wrote:
>Buffer Overflow in ICQ
>
>
>OS tested on: Windows 2000
>ICQ version: 99b 1.1.1.1
>
>ICQ is a very popular chat client that is affected by
>a exploitable buffer
>overflow when it parses an URL sent by another user.

Project Xploiter - Open Source Development
http://www.xploiter.com/project_xploiter/index.html
Xploit your software before it Xploits you!
ICQ UIN: 22731442

home help back first fref pref prev next nref lref last post