[7668] in bugtraq

home help back first fref pref prev next nref lref last post

[rootshell] Security Bulletin #22

daemon@ATHENA.MIT.EDU (DeadSock)
Fri Aug 14 11:34:01 1998

Date: 	Fri, 14 Aug 1998 17:36:41 +0700
Reply-To: DeadSock <deadsock@USA.NET>
From: DeadSock <deadsock@USA.NET>
To: BUGTRAQ@NETSPACE.ORG

just got this news from rootshell, i havent seen it on bugtraq, so i
forward it... btw this one is serious...

--- Forwarded Message ---
>Delivered-To: announce-outgoing@newsletter.connectnet.com
>Date: 14 Aug 1998 05:48:06 -0000
>Cc: recipient list not shown: ;
>From: announce-outgoing@rootshell.com
>X-Mailer: Rootshell 1.0
>Subject: [rootshell] Security Bulletin #22
>
>
>www.rootshell.com
>Security Bulletin #22
>August 13th, 1998
>
>[ http://www.rootshell.com/ ]
>
>----------------------------------------------------------------------
>
>To unsubscribe from this mailing list send e-mail to majordomo@rootshell.com
>with "unsubscribe announce" in the BODY of the message.
>
>Send submissions to info@rootshell.com.  Messages sent will not be sent to
>other members on this list unless it is featured in a security bulletin.
>
>An archive of this list is available at :
>http://www.rootshell.com/mailinglist-archive
>
>----------------------------------------------------------------------
>
>01. ICQ Password Verification Bug
>---------------------------------
>
>It appears that ICQ has yet another bug.  This was just sent in from one of
>our users.  This bug has been confirmed by Rootshell.
>
>>From zallison@rice.edu Thu Aug 13 22:34:42 1998
>Date: Thu, 13 Aug 1998 23:25:49 -0300
>From: zack <zallison@rice.edu>
>To: kit@rootshell.com
>Subject: Major ICQ security hole.
>
>Greetings...
>
>I code a linux ICQ clone, and after one of my users mistyped his
>password, and was allowed into his account anyway.  After further
>investivating, this is what I found.
>
>* It is possible to log in to the ICQ servers as ANYONE without having
>to know their password.  This leads to all sorts of comprimises.  This
>is *not* simply spoofing
>
>How it works:
>
>The mirabilis server uses a password of 8 chars.  Their clients do the
>range checking and only send in passwords of 8 or less chars.  The Linux
>clones, mine in particular, don't do this.
>
>* When a password of 9 or more characters is sent, their buffer is
>over-run, and it allows you to log in.
>
>
>The exploit:
>
>Download any ICQ clone (example: http://hookah.ml.org/zicq)
>
>Set the UIN to be the targets UIN
>Set the password to "123456789" <-- Just large enough to overflow
>
>Start the ICQ program.  If all goes well, it will log in and connect, as
>that user.  Any waiting (offline) messages will be delivered to you.
>You can now send _and_ recieve messages and URLS as the client allows.
>
>Notes:
>
>This is NOT spoofing, you are actually logged in as the selected UIN.
>Unlike spoofing you can recieve messages as well.
>
>All UINS will work, as long as someone is not already logged in with
>that UIN.
>
>Mirabilis / AOL really needs to fix this problem.
>
>Zack
>
>----------------------------------------------------------------------
>
>To unsubscribe from this mailing list send e-mail to majordomo@rootshell.com
>with "unsubscribe announce" in the BODY of the message.
>
>Send submissions to info@rootshell.com.  Messages sent will not be sent to
>other members on this list unless it is featured in a security bulletin.
>
>An archive of this list is available at :
>http://www.rootshell.com/mailinglist-archive
>
>----------------------------------------------------------------------
>
>
--- End of Forwarded Message ---

DeadSock <deadsock@usa.net>
http://members.xoom.com/deadsock/
Key ID 0xD8940389
Fingerprint 74C4 E0AE BBFE 0601 E13F  2ADC 5085 5B48 D894 0389

home help back first fref pref prev next nref lref last post