Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
http://www.securityfocus.com/bid/5765
http://www.iss.net/security_center/static/10163.php
http://www.iss.net/security_center/static/10151.php
http://www.iss.net/security_center/static/10150.php
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0140.html
http://archives.neohapsis.com/archives/ntbugtraq/2002-q3/0139.html
http://archives.neohapsis.com/archives/bugtraq/2002-09/0268.html
http://archives.neohapsis.com/archives/bugtraq/2002-09/0266.html