header-logo
Suggest Exploit
vendor:
Trillian
by:
Lance Fitz-Herbert
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: Trillian
Affected Version From: 0.74
Affected Version To: 0.74
Patch Exists: N/A
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2002

Trillian Buffer Overflow Vulnerability

A vulnerability has been reported for Trillian. Reportedly, Trillian is prone to a buffer overflow condition when it receives blocks of data that are larger than 4095 bytes. A malicious server may exploit this condition to cause a denial of service in the client. This may also potentially be exploited to execute arbitrary code, though this possibility has not been confirmed.

Mitigation:

N/A
Source

Exploit-DB raw data: