[13413] in bugtraq

home help back first fref pref prev next nref lref last post

Re: ICQ Buffer Overflow Exploit

daemon@ATHENA.MIT.EDU (x-x-x-x-x-x-x-x-x)
Tue Jan 18 17:03:52 2000

Mime-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Message-Id:  <000601bf618b$c7450180$2414883e@k6.home.net>
Date:         Tue, 18 Jan 2000 08:10:12 -0000
Reply-To: x-x-x-x-x-x-x-x-x <sadarar@SADARAR.FREESERVE.CO.UK>
From: x-x-x-x-x-x-x-x-x <sadarar@SADARAR.FREESERVE.CO.UK>
X-To:         bugtraq@securityfocus.com
To: BUGTRAQ@SECURITYFOCUS.COM

-----Original Message-----
From: Thomas Maschutznig <hnt@GMX.AT>
To: BUGTRAQ@SECURITYFOCUS.COM <BUGTRAQ@SECURITYFOCUS.COM>
Date: 18 January 2000 02:28
Subject: Re: ICQ Buffer Overflow Exploit


-snip-
:but if you start with http://www... ICQ doesnt seem to check it and
:messages with 2000 characters were no problem.
:


I have been playing with this bug a little, and it seems that ICQ only picks
up oversize messages when they are keyed in, and not when they are pasted.
maybe it wouldn't be so bad if this was fixed so that at least the client
couldn't be used to execute this attack. :-/

home help back first fref pref prev next nref lref last post