![]() ![]() Vendor acknowledgement of the flaws in James's opinion would help persuade the maintainers of these scripts to take actions that are more aggressive. Hence, users of these scripts are not being encouraged to upgrade. About 60% are using mIRC 6.00-6.02.Ī number of major scripts currently advise users not to upgrade to mIRC 6.00 or later as they do not work on the new version. Around 30% of users seem still run mIRC 5.91 or lower. Using a rather rough method James performed mass CTCP VERSION'S on several major channels, located on a number of networks. As a result a large number of users have not upgraded, of course its difficult to make all users upgrade but vendor recognition is a big factor. mIRC is a popular Internet Relay Chat client used by individuals and organizations to communicate, share, play and work with each other on IRC networks around the world. It is worth noting that the vendor has not made any effort to inform its userbase of this flaw or the flaw in versions prior to 6.0 which was released earlier this year. mIRC 6.03 was released on the 16/08/02 that includes a fix for this issue. Vendor was informed on the, along with being provided the proof of concept code. However many scripts introduce an attack vector allowing arbitrary code execution through exploitation of this flaw. ![]() Low to high, a vanilla installation of mIRC does not contain any attack vector to allow a remote compromise. The exploitation of this flaw therefore depends on the script installed by the victim. We reduced and calibrated these data with the standard MIRC pipeline (see Monnier. Many scripts call $asctime on data provided from other remote sources. However the majority of major scripts available for download call $asctime to decode data provided by the IRC server. The default script included with mIRC does not call $asctime at any point. (Just click on any of the links for the most recent mIRC download - 6.03 at the time of. This allows the execution of byte code through calling $asctime with a carefully constructed string. This tutorial will walk through setting up mIRC for use with the. ![]() Passing a string of sufficient length to $asctime will cause a buffer overflow on the stack. A flaw exists in the $asctime identifier, which is used to format UNIX style time stamps. MIRC provides scripting capabilities to allow extension of the client.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |