Trillian < Multiple Vulnerabilities

High Nessus Plugin ID 25547


The remote host contains an instant messaging application that is affected by a buffer overflow vulnerability.


The version of Trillian installed on the remote host reportedly is affected by a heap-based buffer overflow issue involving improper handling of UTF-8 sequences when word-wrapping UTF-8 text. A remote attacker may be able to leverage these issues to execute arbitrary code as the current user.


Upgrade to Trillian or later.

See Also

Plugin Details

Severity: High

ID: 25547

File Name: trillian_3_1_6_0.nasl

Version: $Revision: 1.16 $

Type: local

Agent: windows

Family: Windows

Published: 2007/06/19

Modified: 2017/06/12

Dependencies: 11428

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2007/06/18

Reference Information

CVE: CVE-2007-3305

BID: 24523

OSVDB: 37446