Trillian < Multiple Vulnerabilities

High Nessus Plugin ID 32400


The remote host contains an instant messaging application that is affected by several vulnerabilities.


The version of Trillian installed on the remote host reportedly contains several vulnerabilities :

- A stack-based buffer overflow in 'aim.dll' triggered when parsing messages with overly long attribute values within the 'FONT' tag.

- A memory corruption issue within XML parsing in 'talk.dll' triggered when processing malformed attributes within an 'IMG' tag.

- A stack-based buffer overflow in the header-parsing code for the MSN protocol when processing the 'X-MMS-IM-FORMAT' header.

Successful exploitation of each issue can result in code execution subject to the privileges of the current user.


Upgrade to Trillian or later as it is reported to resolve these issues.

See Also

Plugin Details

Severity: High

ID: 32400

File Name: trillian_3_1_10_0.nasl

Version: $Revision: 1.13 $

Type: local

Agent: windows

Family: Windows

Published: 2008/05/22

Modified: 2016/11/03

Dependencies: 11428

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:trillian:trillian

Required KB Items: SMB/Trillian/Version

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-2407, CVE-2008-2408, CVE-2008-2409

BID: 29330

OSVDB: 45681, 45682, 45683

Secunia: 30336

CWE: 119