27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Description: Synopsis :\n\nThe remote host may give an attacker information useful for future<br />

attacks.\n\nThe remote host is running the mIRC chat client. A vulnerability has been<br />

reported in the mIRC implementation of the DCC protocol. Reportedly, when a DCC<br />

connection is initiated, the command '100 testing' will cause the mIRC server to respond<br />

with the user's current nick. Exploitation of this vulnerability may aid an attack in further<br />

intelligent attacks, or help an attempt at social engineering.<br />

Solution: Upgrade to version 6.1 or higher.<br />

CVE-2002-0425<br />

mIRC < 6.03 Scripting $asctime Overflow<br />

<strong>PVS</strong> ID: 1863 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the mIRC chat client. A buffer overflow has been reported in the $asctime<br />

identifier, a function in the mIRC scripting language. The error lies in the handling of<br />

oversized format specifier strings. Exploitation relies on a script passing untrusted input<br />

into this function. Reportedly, no such script is included in the default installation of mIRC.<br />

Solution: Upgrade to version 6.03 or higher.<br />

CVE-2002-1456<br />

mIRC DCC Get Dialog File Spoofing Weakness<br />

<strong>PVS</strong> ID: 1864 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host may be tricked into running an executable file.\n\nThe<br />

remote host is running the mIRC chat client. It has been reported that it is possible to spoof<br />

file extensions in mIRC's DCC Get dialog. This could be exploited to trick a user into<br />

thinking a malicious file is safe, which may create a false sense of security and cause the<br />

user to open the file.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Trillian IRC PART Message Remote DoS<br />

<strong>PVS</strong> ID: 1865 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Trillian IRC client. Reportedly, Trillian is prone to a Denial of<br />

Service attack when it receives messages about a user leaving a non-specified channel or a<br />

channel that the user is not currently in. It is possible to exploit this issue using a malicious<br />

server.<br />

Family Internet Services 474

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!