btw there was a fix posted on bugtraq that was along with my post

add this to remote and it will tell you and stop anyone trying to use the exploit

ctcp *:dcc send:*: if ($len($nopath($filename)) >= 225) { echo 4 -s [ $nick is trying to exploit with u sending $nopath($filename) ] | halt