Smokey's Security Weblog

veritas odium parit

Highly critical vulnerability in Trillian

Juan Pablo Lopez Yacubian found a highly critical flaw in the popular Trillian chat client that supports AIM, ICQ, MSN, Yahoo Messenger, and IRC.

Secunia: the vulnerability is caused due to an error within the processing of “Display Names” in messages. This can be exploited to cause a memory corruption by e.g. setting the “Display Name” to a specially crafted, overly long string and sending an overly long message to another user using the MSN protocol.

The flaw affect Trillian Basic v3.x and Trillian Pro v3.x

At the moment of writing this vulnerability is still unpatched so take care and add only trusted users to the contact list!

Source: Neohapsis

April 27, 2008 - Posted by | Advisories, Alerts, Downloads, News, Recommended External Security Related Links, Vulnerabilities | , , , , , , , , , , , ,

No comments yet.

Leave a comment