Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long raw 221 message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Trillian | Cerulean_studios | 0.73 (including) | 0.73 (including) |
Trillian | Cerulean_studios | 0.74 (including) | 0.74 (including) |
Trillian | Cerulean_studios | 0.725 (including) | 0.725 (including) |