Trillian IRC Module Channel Name Format String

High Nessus Network Monitor Plugin ID 1870


The remote host is vulnerable to a remote 'format string' flaw.


The remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a format string attack in the IRC module. A remote attacker operating a malicious IRC server can deceive another user into joining a channel with a specially crafted name where malicious code can be stored. The malicious code could then be executed on the user's system, once the user joins the channel.


No solution is known at this time.

Plugin Details

Severity: High

ID: 1870

File Name: 1870.prm

Family: IRC Clients

Published: 2004/08/20

Modified: 2016/11/23

Dependencies: 1878

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:U/RC:ND


Base Score: 7.3

Temporal Score: 6.7


Temporal Vector: CVSS3#E:U/RL:U/RC:X

Reference Information

CVE: CVE-2002-2155

BID: 5388

OSVDB: 10791, 60060