Trillian IRC Module DCC Length Remote Overflow

High Nessus Network Monitor Plugin ID 1867


The remote host is vulnerable to a buffer overflow.


The remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a buffer overflow in the IRC module. By sending an overly long DCC chat message containing 4282 or more to another user, a remote attacker can overflow a buffer and cause the Trillian client to crash or possibly execute code on the system.


No solution is known at this time.

Plugin Details

Severity: High

ID: 1867

File Name: 1867.prm

Family: IRC Clients

Published: 2004/08/20

Modified: 2016/11/23

Dependencies: 1878

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:U/RC:ND


Base Score: 7.3

Temporal Score: 7.3


Temporal Vector: CVSS3#E:H/RL:U/RC:X

Reference Information

CVE: CVE-2002-2173

BID: 5389