mIRC DCC "100 testing" command could reveal the nickname and the number of IRC servers the victim is connected to

mirc-dcc-reveal-info (8393) The risk level is classified as LowLow Risk


mIRC could allow a remote attacker to gain sensitive information about other users. A remote attacker could initiate a DCC connection and send a "100 testing" command to determine a user's nickname and how many IRC servers the user is connected to regardless of whether or not the user accepts the DCC connection request. An attacker could use this information to launch further attacks against the victim or other mIRC users.


Obtain Information


No remedy available as of September 1, 2014.


  • BugTraq Mailing List, Wed Mar 06 2002 - 16:40:34 CST: mIRC DCC Server Security Flaw.
  • mIRC Home page: mIRC - An Internet Relay Chat program.
  • BID-4247: mIRC DCC Nick Disclosure Vulnerability
  • CVE-2002-0425: mIRC DCC server protocol allows remote attackers to gain sensitive information such as alternate IRC nicknames via a 100 testing message in a DCC connection request that cannot be ignored or canceled by the user, which may leak the alternate nickname in a response message.
  • OSVDB ID: 5301: mIRC DCC Server Protocol Nickname Disclosure

Platforms Affected:

  • mIRC mIRC


Mar 06, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page