lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
From: ricky.blaikie at servercity.co.uk (Ricky Blaikie)
Subject: IRC DCC Exploit

You can protect yourself from this exploit by upgrading to version 6.12 of
mIRC, where this 'ploit has been fixed.

--
Ricky Blaikie - Server City Ltd
TEL: 0871 2601000 : FAX: 0871 2601001 : http://www.servercity.co.uk
Visit our website for latest offers and pricing or e-mail me.

-----Original Message-----
From: full-disclosure-admin@...ts.netsys.com
[mailto:full-disclosure-admin@...ts.netsys.com]On Behalf Of Farrukh
Hussain
Sent: 17 October 2003 11:01
To: Full-Disclosure@...ts.netsys.com
Subject: [Full-Disclosure] IRC DCC Exploit



Hey,
      I want to know about DCC Exploit,

1)  What is Irc DCC Exploit ?
2)  How it works ?
3)  What is its Source/code ?
4)  How to protect from this exploit ?
5)  And in which language people were made ?

      I am asking you about it because it is harmfull full, when i join
channel i disconnected 4 times with Critical Error. so please reply me as
soon as possible. Thanks.

Best Regards from,
Farrukh Hussain.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ