mIRC < 6.1 DCC Server Protocol Nickname Disclosure
Medium Nessus Network Monitor Plugin ID 1862
SynopsisThe remote host may give an attacker information useful for future attacks.
DescriptionThe remote host is running the mIRC chat client. A vulnerability has been reported in the mIRC implementation of the DCC protocol. Reportedly, when a DCC connection is initiated, the command '100 testing' will cause the mIRC server to respond with the user's current nick. Exploitation of this vulnerability may aid an attack in further intelligent attacks, or help an attempt at social engineering.
SolutionUpgrade to version 6.1 or higher.