CVE-2002-1486

Trillian <0.74 - Buffer Overflow

Title source: llm
STIX 2.1

Description

Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.

Exploits (5)

exploitdb WORKING POC VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21823
exploitdb WORKING POC VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21816
exploitdb WORKING POC VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21813
exploitdb WORKING POC VERIFIED
by Lance Fitz-Herbert · cremotewindows
https://www.exploit-db.com/exploits/21810
exploitdb WORKING POC VERIFIED
by Lance Fitz-Herbert · cremotewindows
https://www.exploit-db.com/exploits/21804

Scores

EPSS 0.4397
EPSS Percentile 97.5%

Details

Status published
Products (3)
cerulean_studios/trillian 0.73
cerulean_studios/trillian 0.74
cerulean_studios/trillian 0.725
Published Apr 02, 2003
Tracked Since Feb 18, 2026