Skip to main content

CVE-2000-0046: Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malforme

High
VulnerabilityCVE-2000-0046cve-2000-0046buffer overflow
Published: Mon Jan 10 2000 (01/10/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: mirabilis
Product: icq

Description

Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malformed URL within an ICQ message.

AI-Powered Analysis

AILast updated: 06/25/2025, 14:31:02 UTC

Technical Analysis

CVE-2000-0046 is a high-severity buffer overflow vulnerability found in the ICQ 99b client version 0.99b_1.1.1.1, developed by Mirabilis. The flaw arises when the client processes a malformed URL embedded within an ICQ message. Specifically, the vulnerability occurs due to improper bounds checking on the URL data, allowing a remote attacker to overflow a buffer in the client application. This overflow can overwrite adjacent memory, enabling the attacker to execute arbitrary commands on the victim's machine without requiring any authentication or user interaction beyond receiving the malicious message. The vulnerability is remotely exploitable over the network (AV:N), requires no authentication (Au:N), and has low attack complexity (AC:L). The impact spans confidentiality, integrity, and availability, as arbitrary code execution could lead to data theft, system compromise, or denial of service. No patch is available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the software and the specific version affected, the vulnerability primarily threatens environments where legacy ICQ clients are still in use, which is uncommon in modern contexts but may persist in niche or legacy systems.

Potential Impact

For European organizations, the impact of this vulnerability depends on the continued use of the affected ICQ client version. While ICQ usage has drastically declined, some legacy systems or specialized environments might still operate this client, especially in sectors with legacy communication dependencies. Successful exploitation could lead to full system compromise, allowing attackers to execute arbitrary commands remotely, potentially leading to data breaches, unauthorized access to internal networks, and disruption of business operations. This is particularly critical for organizations handling sensitive personal data or intellectual property. Additionally, compromised endpoints could serve as pivot points for lateral movement within corporate networks. The lack of a patch and the ease of exploitation increase the risk for any remaining vulnerable installations. However, the overall risk to most modern European organizations is low due to the obsolescence of the affected software.

Mitigation Recommendations

Given that no patch is available, organizations should prioritize the following mitigations: 1) Identify and inventory any legacy systems still running ICQ 99b 1.1.1.1 clients through network and endpoint asset management tools. 2) Immediately discontinue use of the vulnerable ICQ client and replace it with modern, supported communication platforms that receive regular security updates. 3) Implement network-level controls such as blocking ICQ protocol traffic or filtering malformed ICQ messages at perimeter firewalls or intrusion prevention systems to reduce exposure. 4) Employ endpoint protection solutions capable of detecting anomalous process behavior indicative of exploitation attempts. 5) Educate users about the risks of legacy software and the importance of using supported applications. 6) Monitor network traffic for unusual ICQ message patterns that could indicate exploitation attempts. These targeted actions go beyond generic advice by focusing on legacy software identification, network filtering specific to ICQ, and user awareness tailored to this vulnerability.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df721

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 6/25/2025, 2:31:02 PM

Last updated: 7/30/2025, 9:57:35 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats