[13413] in bugtraq
Re: ICQ Buffer Overflow Exploit
daemon@ATHENA.MIT.EDU (x-x-x-x-x-x-x-x-x)
Tue Jan 18 17:03:52 2000
Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id: <000601bf618b$c7450180$2414883e@k6.home.net>
Date: Tue, 18 Jan 2000 08:10:12 -0000
Reply-To: x-x-x-x-x-x-x-x-x <sadarar@SADARAR.FREESERVE.CO.UK>
From: x-x-x-x-x-x-x-x-x <sadarar@SADARAR.FREESERVE.CO.UK>
X-To: bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM
-----Original Message-----
From: Thomas Maschutznig <hnt@GMX.AT>
To: BUGTRAQ@SECURITYFOCUS.COM <BUGTRAQ@SECURITYFOCUS.COM>
Date: 18 January 2000 02:28
Subject: Re: ICQ Buffer Overflow Exploit
-snip-
:but if you start with http://www... ICQ doesnt seem to check it and
:messages with 2000 characters were no problem.
:
I have been playing with this bug a little, and it seems that ICQ only picks
up oversize messages when they are keyed in, and not when they are pasted.
maybe it wouldn't be so bad if this was fixed so that at least the client
couldn't be used to execute this attack. :-/