Trillian Multiple HTTP Responses Buffer Overflow Vulnerabilities

high Nessus Plugin ID 17611

Synopsis

An attacker may be able to execute arbitrary code on the remote host.

Description

The remote host has the Trillian program installed. Trillian is a Peer2Peer client that allows users to chat and share files with other users across the world.

The remote version of this software is vulnerable to several buffer overflows when processing malformed responses.

An attacker could exploit these flaws to execute arbitrary code on the remote host. To exploit these flaws, an attacker would need to divert several HTTP requests made by the remote host (through DNS poisoning) to a rogue HTTP server sending malformed data.

Solution

Upgrade to a version newer than 3.1.0.121.

Plugin Details

Severity: High

ID: 17611

File Name: trillian_http_response_overflow.nasl

Version: Revision: 1.11

Type: local

Agent: windows

Family: Windows

Published: 3/24/2005

Updated: 4/13/2011

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Ease: No known exploits are available

Reference Information

BID: 12890