Check Point Reference: | CPAI-2008-229 |
Date Published: | 24 Oct 2008 |
Severity: | High |
Last Updated: | Tuesday 01 January, 2008 |
Source: | Secunia Advisory: SA32102 |
Industry Reference: | CVE-2008-4449 |
Protection Provided by: | |
Who is Vulnerable? | mIRC mIRC 6.34 |
Vulnerability Description | A buffer overflow vulnerability was reported in mIRC, a popular IRC client for Microsoft Windows. Internet Relay Chat (IRC) is a form of instant messaging over the Internet, mainly designed for group communication in discussion forums. Remote attackers could exploit this vulnerability by tricking a user into connecting to a malicious IRC server. Successful exploitation could lead to execution of arbitrary code. |
Vulnerability Details | The vulnerability is caused due to a boundary error in the processing of "PRIVMSG" IRC messages. PRIVMSG is an IRC command used to send private messages to specific users. This can be exploited to cause a stack-based buffer overflow that could lead to execution of remote code. |