Date: Sat, 28 Oct 2000 16:17:30 -0500 From: Jeremy Norris <ishmael27@home.com> To: Roman Shterenzon <roman@xpert.com> Cc: ports@FreeBSD.ORG Subject: Re: Remote buffer overflow in gnomeicu 0.93 Message-ID: <20001028161730.A86612@babylon.merseine.nu> In-Reply-To: <20001028004608.A61058@alchemy.oven.org>; from roman@xpert.com on Sat, Oct 28, 2000 at 12:46:08AM %2B0200 References: <20001028004608.A61058@alchemy.oven.org>
next in thread | previous in thread | raw e-mail | index | archive | help
I would think this would be a problem with all icq clients, since icq opens up a tcp port by default. Gnomeicu at least, however, lets you pick what port. Jeremy On Sat, Oct 28, 2000 at 12:46:08AM +0200, Roman Shterenzon wrote: > Hi, > > Yesterday, running sockstat I noticed that openicu listens on TCP port 4000. > I was curious so I fed it with some zeroes from /dev/zero, and, it crashed > like a charm. I'm suspecting buffer overflow which may allow an intruder > to receive a shell on victim's machine. > Looking at code advises that the port can be chosen from 4000-4100 range. > I believe it needs to be checked and the port marked as FORBIDDEN meanwhile. > Sorry if it's false alarm. > > --Roman Shterenzon, UNIX System Administrator and Consultant > [ Xpert UNIX Systems Ltd., Herzlia, Israel. Tel: +972-9-9522361 ] > > > To Unsubscribe: send mail to majordomo@FreeBSD.org > with "unsubscribe freebsd-ports" in the body of the message To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001028161730.A86612>