Overview
The Trillian Instant Messaging client contains a buffer overflow vulnerability that may allow an attacker to execute code.
Description
A Uniform Resource Identifier (URI) is a string of characters that can be used to identify a location, resource, or protocol. The Trillian Instant Messenger client is an IM application that supports multiple services, including AOL Instant Messenger. Trillian registers itself as the default handler for aim: URIs during installation. Web browsers may pass URIs to other applications that have been registered to handle them. A buffer overflow vulnerability exists in the Trillian Instant Messenger client. An attacker may exploit this vulnerability by convincing a user to open a malformed aim: URI inside of a web browser. When the web browser passes the malformed URI to the Trillian Instant Messenger client, the overflow may be triggered. |
Impact
A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running Trillian. |
Solution
Update |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
- http://blog.ceruleanstudios.com/?p=170
- http://www.ceruleanstudios.com/downloads/
- http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html
- http://en.wikipedia.org/wiki/Uniform_Resource_Identifier
- http://secunia.com/advisories/26086/
- http://technet2.microsoft.com/windowsserver/en/library/2621d47b-714b-4549-8f21-29ea082ed76b1033.mspx?mfr=true
Acknowledgements
This issue was disclosed by Nate Mcfeters, Billy (BK) Rios, Raghav "the Pope" Dube.
This document was written by Ryan Giobbi.
Other Information
CVE IDs: | CVE-2007-3832 |
Severity Metric: | 23.76 |
Date Public: | 2007-07-15 |
Date First Published: | 2007-07-16 |
Date Last Updated: | 2007-07-20 18:36 UTC |
Document Revision: | 33 |