what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

unreal-dos.txt

unreal-dos.txt
Posted Jun 25, 2002
Authored by Skyrim | Site madskill.tk

Unreal IRCD v3.1.1 to 3.1.3 denial of service exploit.

tags | exploit, denial of service
SHA-256 | a655ff6119c077cef8aab063446e8798beeb633496ea38743ce791c016fc7c53

unreal-dos.txt

Change Mirror Download
/* MaD SKiLL 'H'
* yay, it's us!
*
* Visit our website at http://www.madskill.tk for more info
* about us.
*
* Topic: Serious flaws in Unreal IRCd => 3.1.1
* Vulnerabilities found by Zombie
*
* Shouts go to: MsH(!), DFA, IceDragon, Key (for his kickass
* network), r0ut3r
*
* This article (security advisory) was written by skyrim
* 19:55 24-6-02
*/

Serious flaw in Unreal IRCd => 3.1.1 - Denial of Service
====================================
Vulnerable: UnrealIRCd => v3.1.1
Tested on : UnrealIRCd v3.1.1, v3.1.2, v3.1.3

Unreal IRCd, one of the most popular IRCd's for UNIX systems,
contains serious security vulnerabilities. The one we're
discussing at the moment, involves the server linking. We will
take a quick look at how the Unreal IRCd linking protocol works:

PASS <link password>
SERVER <server name> 1 <description>

When a server logs into another server, for linking, this is what
it sends. The problem does not lie in the login however. When we
open a connection to one of the servers itself using a raw socket,
we can add additional commands. We introduce ourself as a server
using the protocol above, and after we are logged in succesfully,
we are given the ability to perform different commands. Now, there
is a method which could let the server we connected to crash, when
sending the string:

JOIN #!

Okay, so what happens? We tried to let the server join this
channel itself, but Unreal IRCd doesn't seem to like things such
as this and the program returns a segmentation fault. At this
way, any operator with access to OperServ (That is, when
services are enabled ofcourse) could get the server which links
the services, down. An example of how is displayed below:

/operserv RAW JOIN #!

Note that #! could be any value, the bug is in the JOIN command.

Now, in general this vulnerability wouldn't harm a network that
quick, unless IRC operators are malicious and corrupt users: This
will be very uncommon ofcourse, since the dear network owners
choose their operators very carefully ;). Also faking network links is a
possibility. Our own advise at the moment is to use encrypted links,
which couldn't be faked; Unless you fully change your IRCd, ofcourse.

Another flaw in ALL Unreal IRCd versions - Party time!
========================================
Vulnerable: All Unreal IRCd servers with /SVSNICK enabled
Tested on : UnrealIRCd v3.1.1, v3.1.2, v3.1.3

Another flaw was found in Unreal IRCd, giving IRC ops the possibility
to manipulate their nicks using /svsnick. The /svsnick command is used
by opers for changing nicknames of users, using this procedure:

SVSNICK <nick> <newnick> :<timestamp>

This command does not check for unallowed characters such as the
character "", (alt+3), which is used by many IRC clients such as mIRC
for coloring. So using this command opers could give their nicks a bit
coloring, using something like:

/svsnick skyrim 12s2k12y2r12i2m :1024940702

Although, if the server is linked to a network, the fun won't last long.
Since SVSNICK is only locally not checked, other servers receiving the
message of such a nick and which DO check the nicks, would kill the user
for using malicious characters. As you can see, not really a bug, it's
more just for fun.

MaD SKiLL 'H'
http://www.madskill.tk


_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp.

Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close