vendor:
Pirch IRC 98 Client (response)
by:
His0k4
7,5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: Pirch IRC 98 Client (response)
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP SP3
2008
Pirch IRC 98 Client (response) Remote BOF Exploit (SEH)
A buffer overflow vulnerability exists in Pirch IRC 98 Client (response) due to improper bounds checking of user-supplied input. An attacker can exploit this vulnerability to execute arbitrary code in the context of the application. This vulnerability is being exploited by sending a specially crafted payload to the vulnerable application. This payload contains malicious code that is executed when the application attempts to process the malicious input.
Mitigation:
Upgrade to the latest version of Pirch IRC 98 Client (response) or apply the patch from the vendor.