CVE-2008-2407 – Trillian AIM.DLL Long HTML Font Parameter Stack Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-2407
Stack-based buffer overflow in AIM.DLL in Cerulean Studios Trillian before 3.1.10.0 allows user-assisted remote attackers to execute arbitrary code via a long attribute value in a FONT tag in a message. Desbordamiento de Búfer basado en pila en AIM.DLL en Cerulean Studios Trillian anterior a 3.1.10.0, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario a través de un valor largo en el atributo, en una etiqueta FONT de un mensaje. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trillian. User interaction is required to exploit this vulnerability in that the target must open a malicious image file. The specific flaws exists during the parsing of messages with overly long attribute values within the FONT tag. The value for any attribute is copied into a stack based buffer via sprintf() which can result in a buffer overrun and can be subsequently leveraged to execute arbitrary code under the privileges of the logged in user. • http://secunia.com/advisories/30336 http://securitytracker.com/id?1020104 http://www.securityfocus.com/archive/1/492433/100/0/threaded http://www.securityfocus.com/bid/29330 http://www.vupen.com/english/advisories/2008/1622 http://www.zerodayinitiative.com/advisories/ZDI-08-029 https://exchange.xforce.ibmcloud.com/vulnerabilities/42582 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-2409 – Trillian MSN MIME Header Stack-Based Overflow Vulnerability
https://notcve.org/view.php?id=CVE-2008-2409
Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message. Desbordamiento de búfer basado en pila en Cerulean Studios Trillian Pro anteriores a 3.1.10.0, permite a atacantes remotos ejecutar código arbitrario a través de atributos no especificados en la cabecera X-MMS-IM-FORMAT en un mensaje MSN. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cerulean Studios Trillian Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists within the header parsing code for the msn protocol. When processing the X-MMS-IM-FORMAT header, certain attributes are copied into a buffer located on the stack without any length verification which can eventually lead to code execution with the privileges of the user that is running the application. • http://archives.neohapsis.com/archives/bugtraq/2008-05/0285.html http://secunia.com/advisories/30336 http://securitytracker.com/id?1020106 http://www.securityfocus.com/bid/29330 http://www.vupen.com/english/advisories/2008/1622 http://www.zerodayinitiative.com/advisories/ZDI-08-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/42576 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2008-2008
https://notcve.org/view.php?id=CVE-2008-2008
Buffer overflow in the Display Names message feature in Cerulean Studios Trillian Basic and Pro 3.1.9.0 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long nickname in an MSN protocol message. Desbordamiento de búfer en la característica del mensaje Display Names en Cerulean Studios Trillian Basic y Pro 3.1.9.0 permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección a través de un nickname largo en un mensaje de protocolo MSN. • http://secunia.com/advisories/29952 http://securityreason.com/securityalert/3849 http://www.securityfocus.com/archive/1/491281/100/0/threaded http://www.securityfocus.com/bid/28925 http://www.vupen.com/english/advisories/2008/1368/references • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3832 – Trillian 3.1.6.0 - URI Handler Remote Code Execution
https://notcve.org/view.php?id=CVE-2007-3832
Buffer overflow in the AOL Instant Messenger (AIM) protocol handler in AIM.DLL in Cerulean Studios Trillian allows remote attackers to execute arbitrary code via a malformed aim: URI, as demonstrated by a long URI beginning with the aim:///#1111111/ substring. Desbordamiento de búfer en el manejador del protocolo AOL Instant Messenger (AIM) en IM.DLL en Cerulean Studios Trillian permite a atacantes remotos ejecutar código de su elección a través de un aim malformado: URI, como se demostró con una URI larga que comenzaba con la subcadena ///#1111111/ • https://www.exploit-db.com/exploits/30315 http://archives.neohapsis.com/archives/fulldisclosure/2007-07/0356.html http://secunia.com/advisories/26086 http://www.kb.cert.org/vuls/id/786920 http://www.securityfocus.com/bid/24927 http://www.vupen.com/english/advisories/2007/2546 http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html https://exchange.xforce.ibmcloud.com/vulnerabilities/35447 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-3833
https://notcve.org/view.php?id=CVE-2007-3833
The AOL Instant Messenger (AIM) protocol handler in Cerulean Studios Trillian allows remote attackers to create files with arbitrary contents via certain aim: URIs, as demonstrated by a URI that begins with the "aim: &c:\" substring and contains a full pathname in the ini field. NOTE: this can be leveraged for code execution by writing to a Startup folder. El manejador del protocolo de AOL Instant Messenger (AIM) en Cerulean Studios Trillian permite a atacantes remotos crear archivos con contenido de su elecci´n a través de ciertos aim: URIs, como se demostró con la URI que comenzaba con la subcadena "aim: &c:\" y contiene el nombre de ruta completo en el campo ini. NOTA: esto podría solaparse con la ejecución de código a través de la escritura a una carpeta Startup. • http://secunia.com/advisories/26086 http://www.securityfocus.com/bid/24927 http://www.vupen.com/english/advisories/2007/2546 http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html https://exchange.xforce.ibmcloud.com/vulnerabilities/35449 •