[8655] in bugtraq

home help back first fref pref prev next nref lref last post

iParty can be shut down remotely

daemon@ATHENA.MIT.EDU (HD Moore)
Tue Dec 1 11:37:55 1998

Date: 	Mon, 30 Nov 1998 21:46:52 -0600
Reply-To: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
From: HD Moore <hdmoore@USA.NET>
To: BUGTRAQ@NETSPACE.ORG

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iParty is an audio/text chat program for Windows.  The iParty server
listens on a specified port (6004 is default) for client requests.  If
someone connects to the chat server and sends a large amount of '=FF'
characters (ASCII 255 or Hex FF), the server will simply close itself
and disconnect all the current users.  Nothing shows up in the log
file, and the attacker does not need to know the 'chat room' name.
iParty seems to use a modified version of the X-Win protocol, as it
uses the same format as X for session request responses.  The easiest
way to exploit this hole is:

cat /dev/kmem | telnet targetserver.com 6004

More information on iParty can be found at www.bumpkinland.com.


-----BEGIN PGP SIGNATURE-----
Version: PGP for Personal Privacy 5.0
Charset: noconv

iQA/AwUBNmNmc651X44hunVSEQIGGwCg5lCksOcFT4IEEyowtlOs75fu/2wAn3ZI
pEmwwfuOgrfsz9crATI499rB
=3DBwmD
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post