MIRC v. 5.82 Security Flaw

MIRC v. 5.82 Security Flaw

A bug in the newest version of MIRC (5.82) may allow remote access and control via
/quote and /ctcp. Instances of such use of the bug have already been recorded so action is advisable.
There are two possible solutions:
The easiest and best way to get rid of the security compromise is to downgrade to MIRC version 5.81 or lower.

The second, but untested, solution is to add the following lines to the MIRC remotes:
ctcp 1:finger:haltdef
ctcp 1:userinfo:haltdef
ctcp 1:clientinfo:haltdef
ctcp 1:ping:haltdef
ctcp 1:time:haltdef
ctcp 1:sound:haltdef
ctcp 1:msg:haltdef
ctcp 1:/msg:haltdef

Note: If you are not sure how to do this, it is advisable that you go with the simple downgrade.