• We’re currently investigating an issue related to the forum theme and styling that is impacting page layout and visual formatting. The problem has been identified, and we are actively working on a resolution. There is no impact to user data or functionality, this is strictly a front-end display issue. We’ll post an update once the fix has been deployed. Thanks for your patience while we get this sorted.

Remote exploit vulnerability discovered in mIRC 6.xx, please upgrade to v6.12.

yllus

Elite Member & Lifer
mIRC versions 6.0 through 6.11 are all affected, so see http://www.mirc.co.uk/get.html for download locations - upgrading from previous versions is a completely painless process.

Information on the exploit itself:

Starting Oct 12, 2003, an exploit was used to crash many people's mIRC clients. All versions from 6.0 thru 6.11 were affected, 6.12 was released Oct 13 to fix the problem. The exploit involves a DCC command which can be sent to any person or channel, no matter what your DCC options are. (DCC is used to trade files or for DCC chat.) You can either download the new version (and hope it has no new bugs), or if you can afford to wait a few days, maybe stick to the old temporary fix of ignoring all DCC sends entirely. Just type the following command, on a new line by itself in any chat window, beginning with the slash character:

/ignore -wd *


Taken from irchelp.org.
 
Yeah I've been getting a lot of rejected dcc sends lately...I've been wondering what was up with those. Thanks for the heads up.
 
Back
Top