Vulnerability Details : CVE-2002-1486
Potential exploit
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2002-1486
- cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*
- cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*
- cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2002-1486
55.51%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-1486
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-1486
-
http://www.iss.net/security_center/static/10151.php
Vendor Advisory
-
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html
-
http://www.iss.net/security_center/static/10150.php
-
http://www.securityfocus.com/bid/5769
Exploit;Vendor Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html
-
http://www.securityfocus.com/bid/5777
Exploit;Patch;Vendor Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html
-
http://archives.neohapsis.com/archives/bugtraq/2002-09/0258.html
Exploit;Patch;Vendor Advisory
-
http://www.iss.net/security_center/static/10163.php
Vendor Advisory
-
http://www.securityfocus.com/bid/5765
-
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html
Jump to