9.3
CVSSv2

CVE-2008-4449

Published: 06/10/2008 Updated: 29/09/2017
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 945
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Stack-based buffer overflow in mIRC 6.34 allows remote malicious users to execute arbitrary code via a long hostname in a PRIVMSG message.

Vulnerable Product Search on Vulmon Subscribe to Product

mirc mirc 6.34

Exploits

## # $Id: mirc_privmsg_serverrb 9583 2010-06-22 19:11:05Z todb $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## class Metasploit3 < ...
################################################################################################## # Mirc 634 Remote Buffer Overflow # # This poc allow you to own the 2 first EDI & EDX bytes # # To become remote, add a simple documentlocationhref=irc://servercom/ in some html page # use IO::Socket; sub sock() { my $sock=new IO::Socke ...
#!/usr/bin/perl # # # mIRC 634 Remote Buffer Overflow Exploit # Exploit by SkD (skdrat <at> hotmail <> com) # ---------------------------------------- # A day's work of debugging and looking at mIRC # # Tested on Windows XP SP3 English and Windows Vista SP0 # # Credits to securfrog for publishing the PoC # # Author has no responsib ...