Description
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21823
exploitdb
WORKING POC
VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21816
exploitdb
WORKING POC
VERIFIED
by Lance Fitz-Herbert · cdoswindows
https://www.exploit-db.com/exploits/21813
exploitdb
WORKING POC
VERIFIED
by Lance Fitz-Herbert · cremotewindows
https://www.exploit-db.com/exploits/21810
exploitdb
WORKING POC
VERIFIED
by Lance Fitz-Herbert · cremotewindows
https://www.exploit-db.com/exploits/21804
References (11)
Scores
EPSS
0.4397
EPSS Percentile
97.5%
Details
Status
published
Products (3)
cerulean_studios/trillian
0.73
cerulean_studios/trillian
0.74
cerulean_studios/trillian
0.725
Published
Apr 02, 2003
Tracked Since
Feb 18, 2026