9th Apr 2003 [SBWID-6126]
COMMAND
mIRC dcc filename spoofing
SYSTEMS AFFECTED
mIRC 6.03 and below has been found vulnerable
PROBLEM
Knud Erik Højgaard [kain(at)ircop(dot)dk] found following about mIRC,
"a friendly IRC client that is well equipped with options and tools":
The DCC GET dialog has a limited area visible for the filename. By DCC
sending a file with a specially crafted filename it's possible to
'spoof' a legitimate file.
Sending a file which name consists of for example 'me.mpg' + 'about 180
"alt-0160(fakespace)"' + '.exe' leads the recieving user into believing
that the file is merely a harmless mpeg file, while it is in fact an
executable. mIRC has a handy 'open' button upon completion of the dcc,
so unless the user actually opens the download folder and verifies the
extension of the file, a compromise is possible.
If the remote user has DCC ignore enabled this will of course not work.
SOLUTION
Think twice before opening any kind of file from untrusted source.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH