Vulnerabilities > CVE-2004-1666 - Remote Buffer Overflow vulnerability in Cerulean Studios Trillian 0.74I
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Buffer overflow in the MSN module in Trillian 0.74i allows remote MSN servers to execute arbitrary code via a long string that ends in a newline character.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Exploit-Db
description | Trillian 0.74i Remote Buffer Overflow Exploit (MSN Module Bug). CVE-2004-1666. Remote exploit for windows platform |
id | EDB-ID:435 |
last seen | 2016-01-31 |
modified | 2004-09-08 |
published | 2004-09-08 |
reporter | Komrade |
source | https://www.exploit-db.com/download/435/ |
title | Trillian 0.74i Remote Buffer Overflow Exploit MSN Module Bug |
Nessus
NASL family | Windows |
NASL id | TRILLIAN_MSN_OVERFLOW.NASL |
description | Trillian is a Peer2Peer client that allows users to chat and share files with other users across the world. A bug has been reported in the MSN portion of Trillian. A remote attacker, exploiting this flaw, would be potentially able to execute code on the client system running Trillian. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14686 |
published | 2004-09-08 |
reporter | This script is Copyright (C) 2004-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14686 |
title | Trillian MSN Overflow |
code |
|