CVE-2002-1486

Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*

History

20 Nov 2024, 23:41

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html - Exploit, Patch, Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html - Exploit, Patch, Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html - () http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html -
References () http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html - () http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html -
References () http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html - () http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html -
References () http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html - () http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html -
References () http://www.iss.net/security_center/static/10150.php - () http://www.iss.net/security_center/static/10150.php -
References () http://www.iss.net/security_center/static/10151.php - Vendor Advisory () http://www.iss.net/security_center/static/10151.php - Vendor Advisory
References () http://www.iss.net/security_center/static/10163.php - Vendor Advisory () http://www.iss.net/security_center/static/10163.php - Vendor Advisory
References () http://www.securityfocus.com/bid/5765 - () http://www.securityfocus.com/bid/5765 -
References () http://www.securityfocus.com/bid/5769 - Exploit, Vendor Advisory () http://www.securityfocus.com/bid/5769 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/5777 - Exploit, Patch, Vendor Advisory () http://www.securityfocus.com/bid/5777 - Exploit, Patch, Vendor Advisory

Information

Published : 2003-04-02 05:00

Updated : 2024-11-20 23:41


NVD link : CVE-2002-1486

Mitre link : CVE-2002-1486

CVE.ORG link : CVE-2002-1486


JSON object : View

Products Affected

cerulean_studios

  • trillian