[25791] in bugtraq

home help back first fref pref prev next nref lref last post

Re: MSN666 "backdoor"

daemon@ATHENA.MIT.EDU (Seunghyun Seo)
Fri Jun 14 12:56:13 2002

Message-ID: <001601c213bd$3882ad30$6401a8c0@SEONUS>
From: "Seunghyun Seo" <s1980914@inhavision.inha.ac.kr>
To: "Keith Rogers" <krogers@securityfocus.com>, <bugtraq@securityfocus.com>
Date: Sat, 15 Jun 2002 01:04:53 +0900
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: 8bit


yeh, dude 

MSN666 has no backdoors , but gobble confused, he even wrote *alert mail ,
he seems to be very nervous against MSN666

actually , it has some bugs ,
coz of it is the proof of concept code for "Sensitive IM Security"

i don't think ppls use this as a Server like apache or mysql.
hehe


--
Seunghyun Seo , Inha university Group of Research for Unix Security
[e-mail] seo@igrus.inha.ac.kr, seo@underground.or.kr
----- Original Message ----- 

> 
> I don't beleive that MSN666 has a backdoor. Is the function pattern2 safe
> in it's use of sscanf? What if msg = "XXXXXXXXXXXXXXXXXAAAABBBB" is longer
> than 16 bytes on line 254?
> 
> sscanf ( msg, "%s", &opmsg )
> 
> Any help is appreciated.
> 
> Keith Rogers
> SecurityFocus
> www.securityfocus.com
> 
> 

home help back first fref pref prev next nref lref last post