|
|||
Rule General Information |
---|
Release Date: | 2019-06-06 | |
Rule Name: | mIRC URI Handler Remote Code Execution Vulnerability -3 (CVE-2019-6453) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | mIRC before 7.55 allows remote command execution by using argument injection through custom URI protocol handlers. The attacker can specify an irc:// URI that loads an arbitrary .ini file from a UNC share pathname. Exploitation depends on browser-specific URI handling (Chrome is not exploitable). | |
Impact: | An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | ExploitDB:46392 https://github.com/proofofcalc/cve-2019-6453-poc https://proofofcalc.com/advisories/20190218.txt https://proofofcalc.com/cve-2019-6453-mIRC/ |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://www.mirc.com/news.html |