Trillian IRC Module Buffer Overflow...

- AV AC AU C I A
发布: 2002-08-02
修订: 2025-04-13

A remotely exploitable buffer overflow condition has been reported in the Trillian IRC module. This issue is due to insufficient bounds checking of DCC Chat message length. An attacker can exploit this vulnerability by sending a victim user a DCC Chat message of excessive length (4282+ characters). An attacker may potentially exploit this condition to cause locations in memory to be overwritten with attacker-supplied values, leading to execution of arbitrary code. This may also cause the Trillian client to crash thereby leading to a denial of service condition.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息