[32057] in bugtraq

home help back first fref pref prev next nref lref last post

buffer overflow in IRCD software

daemon@ATHENA.MIT.EDU (Piotr KUCHARSKI)
Mon Oct 13 12:41:21 2003

Date: Sun, 12 Oct 2003 17:39:49 +0200
From: Piotr KUCHARSKI <chopin@sgh.waw.pl>
To: bugtraq@securityfocus.com
Cc: full-disclosure@lists.netsys.com
Message-ID: <20031012153949.GW2891@sgh.waw.pl>
Mail-Followup-To: Piotr KUCHARSKI <chopin@sgh.waw.pl>,
	bugtraq@securityfocus.com, full-disclosure@lists.netsys.com
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-2
Content-Disposition: inline
Content-Transfer-Encoding: 8bit


A buffer overflow bug allowing to crash the server has been
discovered. It is exploitable only by local users and affects
all versions of IRCnet IRCD from 2.10 series, up to 2.10.3p3. 

New release has been made, irc2.10.3p4, and is available from
ftp://ftp.irc.org/irc/server/irc2.10.3p4.tgz

Alternatively, one may apply the fix only:
http://akson.sgh.waw.pl/~chopin/ircd/patches/m_join.diff

It is advised to upgrade ASAP, as there are already exploits
in the wild.

p.

-- 
Beware of he who would deny you access to information, for in his
heart he dreams himself your master.   -- Commissioner Pravin Lal
http://nerdquiz.sgh.waw.pl/  -- polska wersja quizu dla nerdów ;)

home help back first fref pref prev next nref lref last post