Trillian HTTP-parsing Remote Overflow

High Nessus Network Monitor Plugin ID 2749

Synopsis

The remote host is vulnerable to a buffer overflow.

Description

The remote host is running Trillian, a chat client. This version of Trillian is reported vulnerable to a remote overflow. While the details of the vulnerability are not known, the security risk is either a denial of service (availability) or remote code execution (integrity).

Solution

Upgrade or patch according to vendor recommendations.

See Also

http://www.ceruleanstudios.com

Plugin Details

Severity: High

ID: 2749

File Name: 2749.prm

Published: 2005/03/24

Modified: 2016/02/05

Nessus ID: 17611

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.6

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:ND

CVSSv3

Base Score: 8.1

Temporal Score: 7.4

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS3#E:U/RL:U/RC:X

Reference Information

BID: 12890