[23737] in bugtraq

home help back first fref pref prev next nref lref last post

ICQ remote buffer overflow vulnerability

daemon@ATHENA.MIT.EDU (Daniel Tan)
Mon Jan 7 17:08:55 2002

Message-ID: <3C38ACAB.474676E2@seas.upenn.edu>
Date: Sun, 06 Jan 2002 14:59:39 -0500
From: Daniel Tan <datan@seas.upenn.edu>
MIME-Version: 1.0
To: bugtraq@securityfocus.com
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

This is very similar to the AIM overflow recently discovered.

ICQ protocol uses the same TLV (2711) packet and there is a similar 
weakness in the parsing of the packet.


The details of this vulnerability will not be released until a 
further time (when a patch has been implemented, probably). ICQ2000 
clients are vulnerable. ICQ2001 clients do not appear to be 
vulnerable under default setup conditions.

Execution of arbitary code is possible since EAX/EBX point to within
the payload. 

Until AOL announces a patch/workaround, it is highly recommended to 
restrict receiving of events (other than normal messages) to contacts you 
know.


-------------
Daniel Tan
Class of 2004
Jerome Fisher Management & Technology Program
University of Pennsylvania, USA
datan@seas.upenn.edu
datan@wharton.upenn.edu
-------------

home help back first fref pref prev next nref lref last post