[24119] in bugtraq

home help back first fref pref prev next nref lref last post

Re: OSX ICQ DoS

daemon@ATHENA.MIT.EDU (Stephen)
Tue Feb 5 13:20:26 2002

Date: Tue, 5 Feb 2002 11:11:47 -0500 (EST)
From: Stephen <sa7ori@tasam.com>
To: bugtraq@securityfocus.com
In-Reply-To: <20020205104938.U73726-200000@tasam.com>
Message-ID: <20020205110901.D86400-100000@tasam.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

oi, and as a minor addendum, I forgot to note the port number.
it seems that the OSX ICQ clients tend to bind to ports 49152 and
49159 so youll probably want to use those for default attempts,
otherwise just nmap -p49100-49200 or something to find it.

On Tue, 5 Feb 2002, Stephen wrote:

> Hello,
> 	I looked a bit for this problem on the web, and cant find it so
> I am posting it here. Yeah, so its a lame DoS for several versions of
> OSX's ICQ clients. Version information is in the comment space of the
> proof of concept exploit code I have included below. This was a quick
> hack based on some code I authored that exploited a similar problem with
> some earlier versions of Licq. I was learning basic socket coding at the
> time I wrote the Licq thingy, but nonetheless here is the code that works
> on ICQ MacOSX Ver 2.6x Beta Build 7 and others.
>
>
>


home help back first fref pref prev next nref lref last post