Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2006-0489
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
** DISPUTED ** Buffer overflow in the font command of mIRC, probably 6.16, allows local users to execute arbitrary code via a long string. NOTE: the original researcher claims that issue has been disputed by the vendor, and that the vendor stated "as far as I can tell, this is neither an exploit nor a vulnerability. The above report describes a local bug in mIRC." It could be that this is only exploitable by the user of the application, and thus would not cross privilege boundaries unless under an otherwise restrictive environment such as a kiosk..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.6/10
- Exploit Score
- 3.9/10
- Access Vector
- Local
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 6.4/10
- Confidentiality Impact
- Partial
- Availability Impact
- Partial
- Integrity Impact
- Partial
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:khaled_mardam-bey:mirc:6.16:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://trout.snt.utwente.nl/ubbthreads/showflat.php?Cat=0&Board=bugreports&Number=118751
- http://www.securiteam.com/windowsntfocus/5IP080AHPQ.html
- http://www.osvdb.org/22942
- http://securityreason.com/securityalert/383
- http://www.securityfocus.com/archive/1/423758/100/0/threaded
- http://www.securityfocus.com/archive/1/423192/100/0/threaded