Trillian Multiple HTTP Responses Buffer Overflow Vulnerabilities

This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.


Synopsis :

An attacker may be able to execute arbitrary code on the remote host.

Description :

The remote host has the Trillian program installed. Trillian is a
Peer2Peer client that allows users to chat and share files with other
users across the world.

The remote version of this software is vulnerable to several buffer
overflows when processing malformed responses.

An attacker could exploit these flaws to execute arbitrary code on the
remote host. To exploit these flaws, an attacker would need to divert
several HTTP requests made by the remote host (through DNS poisoning)
to a rogue HTTP server sending malformed data.

Solution :

Upgrade to a version newer than 3.1.0.121.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.5
(CVSS2#E:U/RL:U/RC:ND)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 17611 ()

Bugtraq ID: 12890

CVE ID:

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now