Trillian Multiple HTTP Responses Buffer Overflow Vulnerabilities

High Nessus Plugin ID 17611


An attacker may be able to execute arbitrary code on the remote host.


The remote host has the Trillian program installed. Trillian is a Peer2Peer client that allows users to chat and share files with other users across the world.

The remote version of this software is vulnerable to several buffer overflows when processing malformed responses.

An attacker could exploit these flaws to execute arbitrary code on the remote host. To exploit these flaws, an attacker would need to divert several HTTP requests made by the remote host (through DNS poisoning) to a rogue HTTP server sending malformed data.


Upgrade to a version newer than

Plugin Details

Severity: High

ID: 17611

File Name: trillian_http_response_overflow.nasl

Version: $Revision: 1.11 $

Type: local

Agent: windows

Family: Windows

Published: 2005/03/24

Modified: 2011/04/13

Dependencies: 11428

Risk Information

Risk Factor: High


Base Score: 7.6

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

BID: 12890