Trillian IRC Module DCC Length Remote Overflow
High Nessus Network Monitor Plugin ID 1867
SynopsisThe remote host is vulnerable to a buffer overflow.
DescriptionThe remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a buffer overflow in the IRC module. By sending an overly long DCC chat message containing 4282 or more to another user, a remote attacker can overflow a buffer and cause the Trillian client to crash or possibly execute code on the system.
SolutionNo solution is known at this time.