6.5
CVSSv2

CVE-2010-2785

Published: 02/08/2010 Updated: 09/09/2010
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 655
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The IRC Protocol component in KVIrc 3.x and 4.x before r4693 does not properly handle \ (backslash) characters, which allows remote authenticated users to execute arbitrary CTCP commands via vectors involving \r and \40 sequences, a different vulnerability than CVE-2010-2451 and CVE-2010-2452.

Vulnerable Product Search on Vulmon Subscribe to Product

kvirc kvirc 4.0.2

kvirc kvirc 3.0.0

kvirc kvirc 3.4.0

kvirc kvirc 3.0.1

kvirc kvirc 4.0.0

kvirc kvirc 3.4.2

Vendor Advisories

It was discovered that incorrect parsing of CTCP commands in kvirc, a KDE-based IRC client, could lead to the execution of arbitrary IRC commands against other users For the stable distribution (lenny), this problem has been fixed in version 2:340-6 For the unstable distribution (sid), this problem has been fixed in version 4:400-3 We recomm ...

Exploits

source: wwwsecurityfocuscom/bid/42026/info KVIrc is prone to a remote command-execution vulnerability because the application fails to sufficiently sanitize user-supplied input Exploiting this issue can allow an attacker to execute arbitrary commands within the context of the affected application KVIrc 400 is vulnerable; other versi ...