mIRC < 6.1 DCC Server Protocol Nickname Disclosure

medium Nessus Network Monitor Plugin ID 1862

Synopsis

The remote host may give an attacker information useful for future attacks.

Description

The remote host is running the mIRC chat client. A vulnerability has been reported in the mIRC implementation of the DCC protocol. Reportedly, when a DCC connection is initiated, the command '100 testing' will cause the mIRC server to respond with the user's current nick. Exploitation of this vulnerability may aid an attack in further intelligent attacks, or help an attempt at social engineering.

Solution

Upgrade to version 6.1 or higher.

Plugin Details

Severity: Medium

ID: 1862

Family: IRC Clients

Published: 8/20/2004

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:H/RL:U/RC:X

Vulnerability Information

CPE: cpe:/a:khaled_mardam-bey:mirc

Reference Information

CVE: CVE-2002-0425

BID: 4247