Trillian HTTP-parsing Remote Overflow

high Nessus Network Monitor Plugin ID 2749

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running Trillian, a chat client. This version of Trillian is reported vulnerable to a remote overflow. While the details of the vulnerability are not known, the security risk is either a denial of service (availability) or remote code execution (integrity).

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.ceruleanstudios.com

Plugin Details

Severity: High

ID: 2749

Published: 3/24/2005

Updated: 3/6/2019

Nessus ID: 17611

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:U/RC:X

Reference Information

BID: 12890