Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

CHAT:AIM:OVERFLOW:TRILIN-XML-BO

Severity

High

Recommended

No

Recommended Action

Drop

Category

CHAT

Keywords

Trillian XML Tag Handling Heap Buffer Overflow

Release Date

2012/12/26

Update Number

2215

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

CHAT: Trillian XML Tag Handling Heap Buffer Overflow


This signature detects attempts to exploit a known vulnerability in Trillian chat client. A successful attack could allow the attacker to execute arbitrary code on the targeted system. Failed exploit attempts could result in a denial of service condition.

Extended Description

Trillian is prone to multiple memory-corruption vulnerabilities. Attackers can exploit these issues to execute arbitrary code in the context of the affected application or cause denial-of-service conditions. Versions prior to Trillian 3.1.12.0 are affected.

Affected Products

  • Cerulean Studios Trillian 3.1.0
  • Cerulean Studios Trillian 3.1.10.0
  • Cerulean Studios Trillian 3.1.11
  • Cerulean Studios Trillian 3.1.5 0
  • Cerulean Studios Trillian 3.1.5.1
  • Cerulean Studios Trillian 3.1.6.0
  • Cerulean Studios Trillian 3.1.7.0
  • Cerulean Studios Trillian 3.1.9.0
  • Cerulean Studios Trillian Pro 3.1.0

References

  • BugTraq: 32645
  • CVE: CVE-2008-5403

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out