Fish多个远程缓冲区溢出漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

FiSH是很多流行的irc客户端所使用的用于实现加密的插件。 FiSH的xchat插件实现上存在多个缓冲区溢出漏洞,远程攻击者可能利用这些漏洞控制用户机器。 FiSH的xchat插件代码在处理入站数据时会注册4个函数: xchat_hook_server(ph, "PRIVMSG", XCHAT_PRI_NORM, decrypt_incoming, 0); xchat_hook_server(ph, "NOTICE", XCHAT_PRI_NORM, notice_received, 0); xchat_hook_server(ph, "TOPIC", XCHAT_PRI_NORM, decrypt_incoming, 0); xchat_hook_server(ph, "NICK", XCHAT_PRI_NORM, nick_changed, 0); xchat_hook_server(ph, "332", XCHAT_PRI_NORM, decrypt_topic_332, 0); 在所有这些函数中: int decrypt_incoming(char *word[], char *word_eol[], void *userdata) { unsigned char *msg_ptr, contactName[100]="", from_nick[50], msg_event[100]="", psyNetwork[12]; ... if(word[1][0] == ':') ExtractRnick(from_nick, word[1]); ... } 这里ExtractRnick()执行的是: int ExtractRnick(char *Rnick, char *incoming_msg) { int k=0; if(*incoming_msg == ':') incoming_msg++; while(*incoming_msg!='!' && *incoming_msg!=0) { Rnick[k]=*incoming_msg; incoming_msg++; k++; }...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息