CVE-2008-2407
Trillian AIM.DLL Long HTML Font Parameter Stack Overflow Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in AIM.DLL in Cerulean Studios Trillian before 3.1.10.0 allows user-assisted remote attackers to execute arbitrary code via a long attribute value in a FONT tag in a message.
Desbordamiento de Búfer basado en pila en AIM.DLL en Cerulean Studios Trillian anterior a 3.1.10.0, permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario a través de un valor largo en el atributo, en una etiqueta FONT de un mensaje.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trillian. User interaction is required to exploit this vulnerability in that the target must open a malicious image file.
The specific flaws exists during the parsing of messages with overly long attribute values within the FONT tag. The value for any attribute is copied into a stack based buffer via sprintf() which can result in a buffer overrun and can be subsequently leveraged to execute arbitrary code under the privileges of the logged in user. Exploitation may occur over the AIM network or via direct connections.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2008-05-21 CVE Published
- 2008-05-22 CVE Reserved
- 2024-08-07 CVE Updated
- 2024-10-25 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://securitytracker.com/id?1020104 | Vdb Entry | |
http://www.securityfocus.com/archive/1/492433/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/1622 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-08-029 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42582 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.securityfocus.com/bid/29330 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/30336 | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ceruleanstudios Search vendor "Ceruleanstudios" | Trillian Search vendor "Ceruleanstudios" for product "Trillian" | <= 3.1.9.0 Search vendor "Ceruleanstudios" for product "Trillian" and version " <= 3.1.9.0" | - |
Affected
|