Trillian < 3.1.6.0 Multiple Vulnerabilities

high Nessus Plugin ID 25547

Synopsis

The remote host contains an instant messaging application that is affected by a buffer overflow vulnerability.

Description

The version of Trillian installed on the remote host reportedly is affected by a heap-based buffer overflow issue involving improper handling of UTF-8 sequences when word-wrapping UTF-8 text. A remote attacker may be able to leverage these issues to execute arbitrary code as the current user.

Solution

Upgrade to Trillian 3.1.6.0 or later.

See Also

http://www.nessus.org/u?bcd19445

https://www.securityfocus.com/archive/1/471673/30/0/threaded

http://web.archive.org/web/20160320091220/http://blog.trillian.im/?p=150

Plugin Details

Severity: High

ID: 25547

File Name: trillian_3_1_6_0.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 6/19/2007

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 6/18/2007

Reference Information

CVE: CVE-2007-3305

BID: 24523