Page 2 of 34 results (0.006 seconds)

CVSS: 9.3EPSS: 53%CPEs: 15EXPL: 0

Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message. Desbordamiento de búfer basado en pila en Cerulean Studios Trillian Pro anteriores a 3.1.10.0, permite a atacantes remotos ejecutar código arbitrario a través de atributos no especificados en la cabecera X-MMS-IM-FORMAT en un mensaje MSN. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cerulean Studios Trillian Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the header parsing code for the msn protocol. When processing the X-MMS-IM-FORMAT header, certain attributes are copied into a buffer located on the stack without any length verification which can eventually lead to code execution with the privileges of the user that is running the application. • http://archives.neohapsis.com/archives/bugtraq/2008-05/0285.html http://secunia.com/advisories/30336 http://securitytracker.com/id?1020106 http://www.securityfocus.com/bid/29330 http://www.vupen.com/english/advisories/2008/1622 http://www.zerodayinitiative.com/advisories/ZDI-08-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/42576 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 6%CPEs: 2EXPL: 0

Buffer overflow in the Display Names message feature in Cerulean Studios Trillian Basic and Pro 3.1.9.0 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long nickname in an MSN protocol message. Desbordamiento de búfer en la característica del mensaje Display Names en Cerulean Studios Trillian Basic y Pro 3.1.9.0 permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección a través de un nickname largo en un mensaje de protocolo MSN. • http://secunia.com/advisories/29952 http://securityreason.com/securityalert/3849 http://www.securityfocus.com/archive/1/491281/100/0/threaded http://www.securityfocus.com/bid/28925 http://www.vupen.com/english/advisories/2008/1368/references • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 12%CPEs: 1EXPL: 1

Buffer overflow in the AOL Instant Messenger (AIM) protocol handler in AIM.DLL in Cerulean Studios Trillian allows remote attackers to execute arbitrary code via a malformed aim: URI, as demonstrated by a long URI beginning with the aim:///#1111111/ substring. Desbordamiento de búfer en el manejador del protocolo AOL Instant Messenger (AIM) en IM.DLL en Cerulean Studios Trillian permite a atacantes remotos ejecutar código de su elección a través de un aim malformado: URI, como se demostró con una URI larga que comenzaba con la subcadena ///#1111111/ • https://www.exploit-db.com/exploits/30315 http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0356.html http://secunia.com/advisories/26086 http://www.kb.cert.org/vuls/id/786920 http://www.securityfocus.com/bid/24927 http://www.vupen.com/english/advisories/2007/2546 http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html https://exchange.xforce.ibmcloud.com/vulnerabilities/35447 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 1

The AOL Instant Messenger (AIM) protocol handler in Cerulean Studios Trillian allows remote attackers to create files with arbitrary contents via certain aim: URIs, as demonstrated by a URI that begins with the "aim: &c:\" substring and contains a full pathname in the ini field. NOTE: this can be leveraged for code execution by writing to a Startup folder. El manejador del protocolo de AOL Instant Messenger (AIM) en Cerulean Studios Trillian permite a atacantes remotos crear archivos con contenido de su elecci´n a través de ciertos aim: URIs, como se demostró con la URI que comenzaba con la subcadena "aim: &c:\" y contiene el nombre de ruta completo en el campo ini. NOTA: esto podría solaparse con la ejecución de código a través de la escritura a una carpeta Startup. • http://secunia.com/advisories/26086 http://www.securityfocus.com/bid/24927 http://www.vupen.com/english/advisories/2007/2546 http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html https://exchange.xforce.ibmcloud.com/vulnerabilities/35449 •

CVSS: 9.3EPSS: 30%CPEs: 1EXPL: 0

Heap-based buffer overflow in Cerulean Studios Trillian 3.x before 3.1.6.0 allows remote attackers to execute arbitrary code via a message sent through the MSN protocol, or possibly other protocols, with a crafted UTF-8 string, which triggers improper memory allocation for word wrapping when a window width is used as a buffer size, a different vulnerability than CVE-2007-2478. Desbordamiento de búfer basado en pila en Cerulean Studios Trillian 3.x anterior a 3.1.6.0 permite a atacantes remotos ejecutar código de su elección mediante un mensaje enviado a través del protocolo MSN, o posiblemente otros protocolos, con una cadena UTF-8 artesanal, lo cual provoca un reserva de memoria no válida cuando el ancho de ventana es usado como tamaño de búfer, una vulnerabilidad diferente que CVE-2007-2478. • http://blog.ceruleanstudios.com/?p=150 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=545 http://osvdb.org/37446 http://secunia.com/advisories/25736 http://www.kb.cert.org/vuls/id/187033 http://www.securityfocus.com/bid/24523 http://www.securitytracker.com/id?1018265 http://www.vupen.com/english/advisories/2007/2246 https://exchange.xforce.ibmcloud.com/vulnerabilities/34918 •