Check Point Advisories

Update Protection against mIRC PRIVMSG Message Processing Buffer Overflow

Check Point Reference: CPAI-2008-229
Date Published: 24 Oct 2008
Severity: High
Last Updated: Tuesday 01 January, 2008
Source: Secunia Advisory: SA32102
Industry Reference:CVE-2008-4449
Protection Provided by:
Who is Vulnerable? mIRC mIRC 6.34
Vulnerability Description A buffer overflow vulnerability was reported in mIRC, a popular IRC client for Microsoft Windows. Internet Relay Chat (IRC) is a form of instant messaging over the Internet, mainly designed for group communication in discussion forums. Remote attackers could exploit this vulnerability by tricking a user into connecting to a malicious IRC server. Successful exploitation could lead to execution of arbitrary code.
Vulnerability DetailsThe vulnerability is caused due to a boundary error in the processing of "PRIVMSG" IRC messages. PRIVMSG is an IRC command used to send private messages to specific users. This can be exploited to cause a stack-based buffer overflow that could lead to execution of remote code.  

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK