Trillian IRC Module Channel Name Format String

high Nessus Network Monitor Plugin ID 1870

Synopsis

The remote host is vulnerable to a remote 'format string' flaw.

Description

The remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a format string attack in the IRC module. A remote attacker operating a malicious IRC server can deceive another user into joining a channel with a specially crafted name where malicious code can be stored. The malicious code could then be executed on the user's system, once the user joins the channel.

Solution

No solution is known at this time.

Plugin Details

Severity: High

ID: 1870

Family: IRC Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.3

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:cerulean_studios:trillian

Reference Information

CVE: CVE-2002-2155

BID: 5388