Vulnerabilities > CVE-2003-0324 - Buffer Overflow vulnerability in Epic Epic4 1.0.1

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
epic
nessus

Summary

Buffer overflows in EPIC IRC Client (EPIC4) 1.0.1 allows remote malicious IRC servers to cause a denial of service (crash) and possibly execute arbitrary code via long replies that are not properly handled by the (1) userhost_cmd_returned function, or (2) Statusbar capability.

Vulnerable Configurations

Part Description Count
Application
Epic
1

Nessus

NASL familyDebian Local Security Checks
NASL idDEBIAN_DSA-287.NASL
descriptionTimo Sirainen discovered several problems in EPIC, a popular client for Internet Relay Chat (IRC). A malicious server could craft special reply strings, triggering the client to write beyond buffer boundaries. This could lead to a denial of service if the client only crashes, but may also lead to executing of arbitrary code under the user id of the chatting user.
last seen2020-06-01
modified2020-06-02
plugin id15124
published2004-09-29
reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15124
titleDebian DSA-287-1 : epic - buffer overflows