Date: Sat, 28 Oct 2000 13:45:04 +0200 From: Carl Johan Madestrand <cj@vallcom.net> To: ports@freebsd.org, bitchx@lists.bitchx.com, bugtraq@securityfocus.com Subject: BitchX IRC client exploit Message-ID: <20001028134504.A16785@214.norrgarden.se>
next in thread | raw e-mail | index | archive | help
Yesterday it came to my notice that there is a hole in the current version of BitchX 1.0c17 and possibly older versions aswell which I cannot confirm. A remote exploit which allows the intruder to control the users client in the form of sending any kind of text message to the users client including fake public messages. Hence making it appear as if that public message comes from the given nickname. The ability to fake messages is what I think is the worst part about this exploit, because if the user is not using a script of any kind it will appear as normal in the users eyes. If the user is using a script or has changed the standard formats he will notice that these messages are appearing as standard formatting. I have no idea if the intruder can change the standard formatting, I also don't know how this exploit is performed. A wild guess would be through some kind of CTCP. -- Carl Johan Madestrand <cj@vallcom.net> LoRd_CJ on IRC To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001028134504.A16785>