BNC IRC Proxy Buffer Overflow Vulnerability
BID:1927
Info
BNC IRC Proxy Buffer Overflow Vulnerability
| Bugtraq ID: | 1927 |
| Class: | Boundary Condition Error |
| CVE: | |
| Remote: | Yes |
| Local: | Yes |
| Published: | Dec 26 1998 12:00AM |
| Updated: | Dec 26 1998 12:00AM |
| Credit: | Posted to bugtraq by duke <[email protected]> on Sat Dec 26 1998. |
| Vulnerable: |
BNC BNC 2.4.8 BNC BNC 2.4.6 BNC BNC 2.2.4 |
| Not Vulnerable: |
BNC BNC 2.6.2 BNC BNC 2.6 |
Discussion
BNC IRC Proxy Buffer Overflow Vulnerability
BNC's IRC Proxy is used as a gateway to an IRC server.
A buffer stores a username which arguments the program's USER command. User-supplied input to this buffer is improperly checked for length.
As a result, the excessive data copied onto the stack can overwrite critical parts of the stack frame such as the calling functions' return address. Since this data is supplied by the user it can be crafted to alter the program's flow of execution.
If properly exploited, this can yield root privilege to the attacker.
BNC's IRC Proxy is used as a gateway to an IRC server.
A buffer stores a username which arguments the program's USER command. User-supplied input to this buffer is improperly checked for length.
As a result, the excessive data copied onto the stack can overwrite critical parts of the stack frame such as the calling functions' return address. Since this data is supplied by the user it can be crafted to alter the program's flow of execution.
If properly exploited, this can yield root privilege to the attacker.
Exploit / POC
BNC IRC Proxy Buffer Overflow Vulnerability
x
x
Solution / Fix
BNC IRC Proxy Buffer Overflow Vulnerability
Solution:
BNC recommends upgrading to the current version (2.6.2).
Solution:
BNC recommends upgrading to the current version (2.6.2).