Is this worthwile? I will be taking a poll on the people getting back to me.

Someone please email [EMAIL PROTECTED], he's so lonely.

--
kokaninATdtors
I. BACKGROUND

mIRC is "a friendly IRC client that is well equipped with options and
tools"

More information about the application is available at
http://www.mirc.com

II. DESCRIPTION

The DCC server which is builtin in mirc listens on port 59 if enabled, 
and is insecure by design.

III. ANALYSIS

Connecting to the target om port 59 via for example netcat and typing
100 nick-to-spoof will show a dcc chat request in the targets client, 
appearing to originate from nick-to-spoof.
This can be dangerous if trust relationships are observed between
a vulnerable user and a user on a multi-user system, be it a 
shellprovider/vhost supplier or the likes. 

IV. DETECTION

mIRC 6.03 and below (those versions who incorporate the DCC server) are
found to be vulnerable.

V. WORKAROUND

unknown

VI. VENDOR FIX

unknown

VII. CVE INFORMATION

unknown

VIII. DISCLOSURE TIMELINE

unknown

IX. CREDIT
/
Knud Erik H�jgaard/kokaninATdtors.net
I. BACKGROUND

mIRC is "a friendly IRC client that is well equipped with options and
tools"

More information about the application is available at
http://www.mirc.com

II. DESCRIPTION

The 'URL handler' allows a user to double-click an url posted in a channel
or in a query. This will afterwards be opened in the default browser.
The 'URL handler' fails to filter/ignore colour codes in links, making
'url spoofing' possible.

III. ANALYSIS

Messaging users stuff like "Oh my god Saddam just blew up Israel look
for yourself on [EMAIL PROTECTED]/ref.php?refid=spam-user"
will lead the target to beleive he's entering cnn.com, while he is in 
fact accessing www.paysite.com and giving clicks/cash/whatever to the
'attacker'. Note that the 0 is the colour white, which is the default
background colour in mIRC.

IV. DETECTION

mIRC 6.03 and below (those versions who incorporate colour codes/url 
handling) are found to be vulnerable.

V. WORKAROUND

unknown

VI. VENDOR FIX

unknown

VII. CVE INFORMATION

unknown

VIII. DISCLOSURE TIMELINE

unknown

IX. CREDIT

Knud Erik H�jgaard/kokaninATdtors.net

Reply via email to