First published: Tue Mar 18 2003(Updated: )
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cerulean Studios Trillian | =0.73 | |
Cerulean Studios Trillian | =0.725 | |
Cerulean Studios Trillian | =0.74 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1486 has a high severity rating due to its potential for remote code execution and denial of service.
To fix CVE-2002-1486, users should upgrade to a patched version of Trillian beyond 0.74.
CVE-2002-1486 affects Trillian versions 0.73, 0.725, and 0.74.
CVE-2002-1486 allows for denial of service attacks and potentially arbitrary code execution through malicious IRC servers.
While CVE-2002-1486 was identified over two decades ago, it remains relevant for systems that may still be running affected versions of Trillian.