Vulnerability Details : CVE-2003-1336
Buffer overflow in mIRC before 6.11 allows remote attackers to execute arbitrary code via a long irc:// URL.
Vulnerability category: OverflowExecute code
At least one public exploit which can be used to exploit this vulnerability exists!
Exploit prediction scoring system (EPSS) score for CVE-2003-1336
Probability of exploitation activity in the next 30 days: 80.88%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2003-1336
-
mIRC IRC URL Buffer Overflow
Disclosure Date: 2003-10-13First seen: 2020-04-26exploit/windows/browser/mirc_irc_urlThis module exploits a stack buffer overflow in mIRC 6.1. By submitting an overly long and specially crafted URL to the 'irc' protocol, an attacker can overwrite the buffer and control program execution. Authors: - MC <mc@metasploit.com>
CVSS scores for CVE-2003-1336
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
nvd@nist.gov |
CWE ids for CVE-2003-1336
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2003-1336
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/13405
-
http://www.securiteam.com/windowsntfocus/6M00B0U8KE.html
Patch
-
http://archives.neohapsis.com/archives/ntbugtraq/2003-q4/0060.html
Patch
-
http://www.securityfocus.com/bid/8819
mIRC IRC URL Buffer Overflow VulnerabilityExploit;Patch
Products affected by CVE-2003-1336
- cpe:2.3:a:mirc:mirc:*:*:*:*:*:*:*:*