mIRC DCC Get Dialog File Spoofing Weakness

Medium Nessus Network Monitor Plugin ID 1864

Synopsis

The remote host may be tricked into running an executable file.

Description

The remote host is running the mIRC chat client. It has been reported that it is possible to spoof file extensions in mIRC's DCC Get dialog. This could be exploited to trick a user into thinking a malicious file is safe, which may create a false sense of security and cause the user to open the file.

Solution

Upgrade or patch according to vendor recommendations.

Plugin Details

Severity: Medium

ID: 1864

File Name: 1864.prm

Family: IRC Clients

Published: 2004/08/20

Modified: 2016/02/05

Dependencies: 1878

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5.1

Temporal Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:U/RC:ND

CVSSv3

Base Score: 5.6

Temporal Score: 5.6

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:H/RL:U/RC:X

Reference Information

BID: 7304