27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Trillian IRC Raw Message DoS<br />

<strong>PVS</strong> ID: 1869 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Denial of Service (DoS) attack.\n\nThe<br />

remote host is running the Trillian IRC client. Trillian version 0.74 and possibly other<br />

versions are vulnerable to a Denial of Service attack, caused by improper validation of IRC<br />

raw messages. By sending one of the following raw requests: 206, 211, 213, 214, 215, 217,<br />

218, 243, 302, 317, 324, 332, 333, 352, or 367, a remote attacker in control of a malicious<br />

IRC server could cause the victim's Trillian client to crash.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE-2002-1487<br />

Trillian IRC Module Channel Name Format String<br />

<strong>PVS</strong> ID: 1870 FAMILY: IRC Clients RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a remote 'format string' flaw.\n\nThe remote<br />

host is running the Trillian IRC client. Trillian versions 0.725 and 0.73 are vulnerable to a<br />

format string attack in the IRC module. A remote attacker operating a malicious IRC server<br />

can deceive another user into joining a channel with a specially crafted name where<br />

malicious code can be stored. The malicious code could then be executed on the user's<br />

system, once the user joins the channel.<br />

Solution: No solution is known at this time.<br />

CVE-2002-2155<br />

Trillian IRC Server Response Remote Overflow<br />

<strong>PVS</strong> ID: 1871 FAMILY: IRC Clients<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a buffer overflow.\n\nThe remote host is<br />

running the Trillian IRC client. Trillian version 0.73 and earlier are vulnerable to a buffer<br />

overflow in the IRC module. By operating a malicious IRC server and sending malformed<br />

responses, a remote attacker can overflow a buffer and execute code on the server.<br />

Solution: No solution is known at this time.<br />

CVE Not available<br />

Trillian IRC JOIN Remote Overflow<br />

<strong>PVS</strong> ID: 1872 FAMILY: IRC Clients<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Family Internet Services 476

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!