Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
2004-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cerulean_studios | trillian | 0.71 | Yes |
Application | cerulean_studios | trillian | 0.73 | Yes |
Application | cerulean_studios | trillian | 0.74 | Yes |
Application | cerulean_studios | trillian | 0.74b | Yes |
Application | cerulean_studios | trillian | 0.74c | Yes |
Application | cerulean_studios | trillian | 0.74d | Yes |
Application | cerulean_studios | trillian | 0.74e | Yes |
Application | cerulean_studios | trillian | 0.74f | Yes |
Application | cerulean_studios | trillian | 0.74g | Yes |
Application | cerulean_studios | trillian | 0.725 | Yes |
Application | cerulean_studios | trillian_pro | 1.0 | Yes |
Application | cerulean_studios | trillian_pro | 2.0 | Yes |
Application | cerulean_studios | trillian_pro | 2.01 | Yes |