HTTP: mIRC IRC URI Handler Buffer Overflow
This signature detects attempts to exploit a known vulnerability against the mIRC IRC client URI handler plugin. Attackers can supply a malicious crafted hostname, which can cause a buffer overflow and allow them to execute arbitrary code on the client.
Extended Description
When mIRC is installed it registers a handler for a 'irc://' type of URL. Through these means, mIRC is invoked when an 'IRC URL' is followed. mIRC has been reported prone to a buffer overflow vulnerability when handling malicious 'IRC URLs'. The issue likely presents itself due to a lack of sufficient boundary checks performed when IRC URL data is being copied into an insufficient buffer in memory. Ultimately a remote attacker may exploit this condition to execute arbitrary instructions in the context of the user running the affected client.
Affected Products
Khaled_mardam-bey mirc
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Khaled_mardam-bey