Short Name |
CHAT:AIM:OVERFLOW:TRILLIAN-XML |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
CHAT |
Keywords |
Cerulean Studios Trillian Image Filename XML Tag Stack Buffer Overflow |
Release Date |
2010/10/20 |
Update Number |
1795 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known stack buffer overflow vulnerability in Trillian instant messenger client application. It is due to a boundary error when processing images in the received messages. This can be exploited by remote attackers by sending a malicious message to the target AIM screen name. A successful attack can lead to arbitrary code injection and execution within the security context of the currently logged on user. The behavior of the target depends on the intention of the attacker. In an unsuccessful attack the affected product terminates abnormally.
Trillian is prone to multiple memory-corruption vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application or cause denial-of-service conditions. Versions prior to Trillian 3.1.12.0 are affected.