Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Trillian IRC Module DCC Length Remote Overflow

High

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a buffer overflow in the IRC module. By sending an overly long DCC chat message containing 4282 or more to another user, a remote attacker can overflow a buffer and cause the Trillian client to crash or possibly execute code on the system.

Solution

No solution is known at this time.