Trillian < 3.1.5.1 XMPP Decoding Heap Overflow

high Nessus Plugin ID 25148

Synopsis

The remote host contains an instant messaging application which is susceptible to a heap overflow vulnerability.

Description

The version of Trillian installed on the remote host contains a buffer overflow vulnerability which can be triggered when decoding a malformed XMPP (eXtensible Messaging and Presence Protocol) message.

To exploit this flaw, an attacker would need to send a specially crafted XMPP message to a user of this program, thus causing arbitrary code execution.

Solution

Upgrade to Trillian 3.1.5.1 or later.

See Also

http://dvlabs.tippingpoint.com/advisory/TPTI-07-06

Plugin Details

Severity: High

ID: 25148

File Name: trillian_3_1_5_1.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 5/3/2007

Updated: 8/1/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 5/1/2007

Reference Information

CVE: CVE-2007-2418

BID: 23781

CWE: 119