CVE-2002-1486
Trillian 0.725/0.73/0.74 - IRC User Mode Numeric Remote Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
8Exploited in Wild
-Decision
Descriptions
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Multiples desbordamiento de búfer en el componente IRC de Trillian 0.73 y 0.74 permite a servidores IRC remotos malintencionados causar la Denegación de Servicios y posiblemente la ejecución de código arbitrario mediante:
una respuesta larga del servidor.
un JOIN con un nombre de canal largo.
un mensaje largo raw 221.
un PRIVMSG con un alias (nick) largo.
una respuesta larga de un servidor IDENT.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2002-09-18 First Exploit
- 2003-02-05 CVE Reserved
- 2003-03-18 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html | Mailing List | |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html | Mailing List | |
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html | Mailing List | |
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html | Mailing List | |
http://www.iss.net/security_center/static/10150.php | Vdb Entry | |
http://www.securityfocus.com/bid/5765 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/21816 | 2002-09-21 | |
https://www.exploit-db.com/exploits/21813 | 2002-09-20 | |
https://www.exploit-db.com/exploits/21823 | 2002-09-22 | |
https://www.exploit-db.com/exploits/21804 | 2002-09-18 | |
https://www.exploit-db.com/exploits/21810 | 2002-09-19 | |
http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html | 2024-08-08 | |
http://www.securityfocus.com/bid/5769 | 2024-08-08 | |
http://www.securityfocus.com/bid/5777 | 2024-08-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.iss.net/security_center/static/10151.php | 2008-09-05 | |
http://www.iss.net/security_center/static/10163.php | 2008-09-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cerulean Studios Search vendor "Cerulean Studios" | Trillian Search vendor "Cerulean Studios" for product "Trillian" | 0.73 Search vendor "Cerulean Studios" for product "Trillian" and version "0.73" | - |
Affected
| ||||||
Cerulean Studios Search vendor "Cerulean Studios" | Trillian Search vendor "Cerulean Studios" for product "Trillian" | 0.74 Search vendor "Cerulean Studios" for product "Trillian" and version "0.74" | - |
Affected
| ||||||
Cerulean Studios Search vendor "Cerulean Studios" | Trillian Search vendor "Cerulean Studios" for product "Trillian" | 0.725 Search vendor "Cerulean Studios" for product "Trillian" and version "0.725" | - |
Affected
|