Jump to content

DCC SEND exploit

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by 68.52.123.167 (talk) at 03:36, 6 September 2007. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The DCC SEND exploit is an IRC related bug in some Netgear and Linksys routers. This bug can be reproduced by typing in an IRC channel:

DCC SEND [character argument]

Replacing [character argument] with a string of 14 or more characters (not including spaces) will cause some users to accidentally disconnect. On some large networks, more than 40 connections can be broken this way. Only if the users of the channel are using the affected Netgear/Linksys routers will they have their connection broken.

Usually, this exploit can be avoided by connecting to the IRC server using a port other than 6667, which is what most clients default to.

Disclaimer: Sometimes, reproducing this bug can result in getting yourself K-lined.