Описание
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- Patch
- PatchVendor Advisory
- PatchVendor Advisory
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cerulean_studios:trillian:0.71:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:2.01:*:*:*:*:*:*:*
EPSS
Процентиль: 87%
0.03243
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
EPSS
Процентиль: 87%
0.03243
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other