This script is Copyright (C) 2007-2017 Tenable Network Security, Inc.
The remote host contains an instant messaging application that is
affected by two vulnerabilities.
The version of Trillian installed on the remote host contains a buffer
overflow in its AIM protocol URI handler in 'aim.dll' and also allows
creation of arbitrary files with arbitrary content using specially-
crafted 'aim://'' URIs. A remote attacker may be able to leverage
these issues to execute arbitrary code as the current user.
See also :
Upgrade to Trillian 188.8.131.52 or later.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.5
Public Exploit Available : true