Trillian IRC Oversized Data Block Remote Overflow DoS
Medium Nessus Network Monitor Plugin ID 1868
SynopsisThe remote host is vulnerable to a Denial of Service (DoS) attack.
DescriptionThe remote host is running the Trillian IRC client. Trillian version 0.74 and possibly other versions are vulnerable to a Denial of Service attack, caused by a buffer overflow. By sending more than 4095 characters to a vulnerable Trillian client, a remote attacker in control of a malicious IRC server could overflow a buffer and cause the victim's Trillian client to crash.
SolutionUpgrade or patch according to vendor recommendations.