Bugtraq mailing list archives
Re: ICQ Buffer Overflow Exploit
From: sadarar () SADARAR FREESERVE CO UK (x-x-x-x-x-x-x-x-x)
Date: Tue, 18 Jan 2000 08:10:12 -0000
-----Original Message----- From: Thomas Maschutznig <hnt () GMX AT> To: BUGTRAQ () SECURITYFOCUS COM <BUGTRAQ () SECURITYFOCUS COM> Date: 18 January 2000 02:28 Subject: Re: ICQ Buffer Overflow Exploit -snip- :but if you start with http://www... ICQ doesnt seem to check it and :messages with 2000 characters were no problem. : I have been playing with this bug a little, and it seems that ICQ only picks up oversize messages when they are keyed in, and not when they are pasted. maybe it wouldn't be so bad if this was fixed so that at least the client couldn't be used to execute this attack. :-/
Current thread:
- Re: ICQ Buffer Overflow Exploit Thomas Maschutznig (Jan 15)
- <Possible follow-ups>
- Re: ICQ Buffer Overflow Exploit x-x-x-x-x-x-x-x-x (Jan 18)
- Re: ICQ Buffer Overflow Exploit Bryce Walter (Jan 18)
- Re: ICQ Buffer Overflow Exploit Jeremy Johnson (Jan 19)
- Re: ICQ Buffer Overflow Exploit Nick Summy (Jan 19)
- Re: ICQ Buffer Overflow Exploit Dylan Griffiths (Jan 19)
- explanation and code for stream.c issues Tim Yardley (Jan 21)
- Re: explanation and code for stream.c issues Tim Yardley (Jan 21)
- Re: explanation and code for stream.c issues Tim Yardley (Jan 21)
- Re: explanation and code for stream.c issues Erik Fichtner (Jan 21)
- Re: explanation and code for stream.c issues Brett Glass (Jan 21)
- S/Key & OPIE Database Vulnerability harikiri (Jan 21)