Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/5777 | exploit vdb entry patch vendor advisory |
http://www.securityfocus.com/bid/5769 | exploit vdb entry vendor advisory |
http://www.securityfocus.com/bid/5765 | vdb entry |
http://www.iss.net/security_center/static/10151.php | vdb entry vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html | mailing list |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html | mailing list |
http://www.iss.net/security_center/static/10163.php | vdb entry vendor advisory |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html | mailing list exploit patch vendor advisory |
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html | mailing list |
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html | mailing list |
http://www.iss.net/security_center/static/10150.php | vdb entry |