Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

mIRC DCC Get Dialog File Spoofing Weakness



The remote host may be tricked into running an executable file.


The remote host is running the mIRC chat client. It has been reported that it is possible to spoof file extensions in mIRC's DCC Get dialog. This could be exploited to trick a user into thinking a malicious file is safe, which may create a false sense of security and cause the user to open the file.


Upgrade or patch according to vendor recommendations.