– IRC News

All about Internet Relay Chat

IRCu Family IRCd DoS Exploit

Last month a new bug have been found in IRCu family IRCd’s which can be exploited leading to a crashing server.

In this post on Milw0rm the bug and exploit is explained. IRCu (<= and many derivatives are affected.

IRC-Junkie asked Slug, who found the bug and described it on Milw0rm, how he found the bug. “Core dump from one of our servers,” Slug starts. “send_user_mode in s_user.c does not check that the argument after a +r mode is present, if it is not than the NULL sentinel may be missed, causing the function to iterate over the boundary of the array.”

One way to exploit the bug would be using the command with string /mode nickname i i i i i i i i i i i i i i i r r r r s. Doing so would core the server.

Only cure is to upgrade to the latest version of the IRCd with fix for this exploit.

Category: Hack, IRC, IRCd
Tag: , ,
  • El_Rico says:

    I am not too sure that it was a wise idea that slug posted such an easy way to exploit it.

    October 29, 2008 at 1:31 pm
  • Asmo says:

    Even if it was ‘hard’ to exploit enough people would be able to exploit. As long as enough time has been given to the users to upgrade…

    October 29, 2008 at 1:31 pm

Your email address will not be published. Required fields are marked *