icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Trillian IRC Module DCC Length Remote Overflow

High

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a buffer overflow in the IRC module. By sending an overly long DCC chat message containing 4282 or more to another user, a remote attacker can overflow a buffer and cause the Trillian client to crash or possibly execute code on the system.

Solution

No solution is known at this time.