Lucene search

K

pIRCh-dcc.txt

🗓️ 17 Aug 1999 00:00:00Reported by Packet StormType 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 17 Views

Old IRC Client pIRCh allows DCC downloads to overwrite files with malicious scripts. Change directory.

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Code
`Date: Thu, 12 Nov 1998 11:20:56 -0600  
From: "[email protected]" <[email protected]>  
To: [email protected]  
Subject: Old IRC Client bug Re-Applied  
  
If this has already been announced, well, screw me.  
  
Problem:  
The IRC (Internet Relay Chat) Client, pIRCh automatically assigns  
your main pirch directory to where DCC downloads are sent.  
  
Exploit:  
You can replace someone's script file with a malicious one,  
therefore recieving control over an ignorant irc tenant. This can be  
done by sending a replacement file via DCC to the user. Most  
people could tell the user that it was something cool, and they  
would accept it.  
  
Fix:  
Simply goto Tools.. then Preferences. Flip to the DCC tab and  
change your default DCC recieve directory to something that is not  
the main pIRCh directory.  
  
Tested On:  
pIRCh32 0.92  
If there's a new version out that fixes it, well crap, I'm sorry for  
taking up your time.  
  
Cheers,  
REwT <[email protected]>  
PaKT-TeCH Sekurity | REwT Technologies  
  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
17 Aug 1999 00:00Current
7.4High risk
Vulners AI Score7.4
17
.json
Report