Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 28 Oct 2000 13:45:04 +0200
From:      Carl Johan Madestrand <cj@vallcom.net>
To:        ports@freebsd.org, bitchx@lists.bitchx.com, bugtraq@securityfocus.com
Subject:   BitchX IRC client exploit
Message-ID:  <20001028134504.A16785@214.norrgarden.se>

next in thread | raw e-mail | index | archive | help
Yesterday it came to my notice that there is a hole in the current version of
BitchX 1.0c17 and possibly older versions aswell which I cannot confirm.
A remote exploit which allows the intruder to control the users client in the
form of sending any kind of text message to the users client including fake
public messages. Hence making it appear as if that public message comes from
the given nickname.

The ability to fake messages is what I think is the worst part about this
exploit, because if the user is not using a script of any kind it will appear
as normal in the users eyes.

If the user is using a script or has changed the standard formats he will
notice that these messages are appearing as standard formatting.
I have no idea if the intruder can change the standard formatting, I also
don't know how this exploit is performed. A wild guess would be through some kind of CTCP.

-- 
Carl Johan Madestrand <cj@vallcom.net>
LoRd_CJ on IRC


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001028134504.A16785>