remote mirc < 6.11 exploit by blasty
This exploit (ab)uses the bug in irc:// URI handling. It contains a buffer-overflow, and when more then 998 bytes are given EIP will be overwritten. At first I was thinking of a simple solution to get this exploitable. Since giving an URI with > 998 chars to someone on IRC is simply NOT done. Then I remember the iframe-irc:// flaw found by uuuppzz. This exploit will write an malicious HTML file containing an iframe executing the irc:// address. So you can give this to anyone on IRC for example. The shellcode included does only execute cmd.exe, because I don't want to be this a scriptkiddy util. But, replacing the shellcode with your own is also possible. An 400 bytes shellcode (bindshell etc.) easily fits in the buffer, but it may require some tweaking. After exiting the cmd.exe mIRC will crash, so shellcode its not 100% clean, but who carez. Oh yeah, I almost forgot.. this exploit also works even if mIRC isn't started. mIRC will start automatically when an irc:// is executed, so you can also send somebody and HTML email containing the evil HTML code. (only for poor clients like Outlook Express).