[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2002-1486Date: (C)2003-04-02   (M)2023-12-22


Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html
http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html
http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html
http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html
BID-5765
BID-5769
BID-5777
trillian-irc-join-bo(10150)
trillian-irc-server-bo(10163)
trillian-raw221-bo(10151)

© SecPod Technologies