[32057] in bugtraq
buffer overflow in IRCD software
daemon@ATHENA.MIT.EDU (Piotr KUCHARSKI)
Mon Oct 13 12:41:21 2003
Date: Sun, 12 Oct 2003 17:39:49 +0200
From: Piotr KUCHARSKI <chopin@sgh.waw.pl>
To: bugtraq@securityfocus.com
Cc: full-disclosure@lists.netsys.com
Message-ID: <20031012153949.GW2891@sgh.waw.pl>
Mail-Followup-To: Piotr KUCHARSKI <chopin@sgh.waw.pl>,
bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
A buffer overflow bug allowing to crash the server has been
discovered. It is exploitable only by local users and affects
all versions of IRCnet IRCD from 2.10 series, up to 2.10.3p3.
New release has been made, irc2.10.3p4, and is available from
ftp://ftp.irc.org/irc/server/irc2.10.3p4.tgz
Alternatively, one may apply the fix only:
http://akson.sgh.waw.pl/~chopin/ircd/patches/m_join.diff
It is advised to upgrade ASAP, as there are already exploits
in the wild.
p.
--
Beware of he who would deny you access to information, for in his
heart he dreams himself your master. -- Commissioner Pravin Lal
http://nerdquiz.sgh.waw.pl/ -- polska wersja quizu dla nerdów ;)