Описание
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Ссылки
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:cerulean_studios:trillian:0.71:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74b:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74c:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74d:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74e:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74f:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.74g:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:1.0:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:2.0:*:*:*:*:*:*:*
cpe:2.3:a:cerulean_studios:trillian_pro:2.01:*:*:*:*:*:*:*
EPSS
Процентиль: 90%
0.05421
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
EPSS
Процентиль: 90%
0.05421
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other