Trillian DirectIM Packet Remote Overflow

High Nessus Plugin ID 12076


The remote Windows host contains an instant messaging client that is vulnerable to a buffer overflow attack.


An integer buffer overflow exists in the AOL Instant Messenger (AIM) component of the version of Trillian instant messaging client installed on the remote host. By sending a DirectIM packet with a size above 8k bytes, a remote attacker can potentially execute code on the affected host subject to the user's privileges.


Upgrade to Trillian 0.74 patch G or higher.

See Also

Plugin Details

Severity: High

ID: 12076

File Name: trillian_patchg.nasl

Version: $Revision: 1.17 $

Type: local

Agent: windows

Family: Windows

Published: 2004/02/25

Modified: 2016/11/17

Dependencies: 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Registry/Enumerated

Vulnerability Publication Date: 2004/02/24

Reference Information

CVE: CVE-2004-2304

OSVDB: 4056