CVE-2007-3833
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The AOL Instant Messenger (AIM) protocol handler in Cerulean Studios Trillian allows remote attackers to create files with arbitrary contents via certain aim: URIs, as demonstrated by a URI that begins with the "aim: &c:\" substring and contains a full pathname in the ini field. NOTE: this can be leveraged for code execution by writing to a Startup folder.
El manejador del protocolo de AOL Instant Messenger (AIM) en Cerulean Studios Trillian permite a atacantes remotos crear archivos con contenido de su elecci´n a través de ciertos aim: URIs, como se demostró con la URI que comenzaba con la subcadena "aim: &c:\" y contiene el nombre de ruta completo en el campo ini. NOTA: esto podría solaparse con la ejecución de código a través de la escritura a una carpeta Startup.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-07-17 CVE Reserved
- 2007-07-17 CVE Published
- 2024-05-20 EPSS Updated
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/26086 | Third Party Advisory | |
http://www.vupen.com/english/advisories/2007/2546 | Vdb Entry | |
http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35449 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/24927 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cerulean Studios Search vendor "Cerulean Studios" | Trillian Search vendor "Cerulean Studios" for product "Trillian" | 3.1.6.0 Search vendor "Cerulean Studios" for product "Trillian" and version "3.1.6.0" | - |
Affected
|