mIRC DCC "100 testing" command could reveal the nickname and the number of IRC servers the victim is connected to
|mirc-dcc-reveal-info (8393)||Low Risk|
mIRC could allow a remote attacker to gain sensitive information about other users. A remote attacker could initiate a DCC connection and send a "100 testing" command to determine a user's nickname and how many IRC servers the user is connected to regardless of whether or not the user accepts the DCC connection request. An attacker could use this information to launch further attacks against the victim or other mIRC users.
No remedy available as of April 1, 2014.
- BugTraq Mailing List, Wed Mar 06 2002 - 16:40:34 CST: mIRC DCC Server Security Flaw.
- mIRC Home page: mIRC - An Internet Relay Chat program.
- BID-4247: mIRC DCC Nick Disclosure Vulnerability
- CVE-2002-0425: mIRC DCC server protocol allows remote attackers to gain sensitive information such as alternate IRC nicknames via a 100 testing message in a DCC connection request that cannot be ignored or canceled by the user, which may leak the alternate nickname in a response message.
- OSVDB ID: 5301: mIRC DCC Server Protocol Nickname Disclosure
- mIRC mIRC
Mar 06, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this