Vulnerabilities > CVE-2007-3833 - Unspecified vulnerability in Cerulean Studios Trillian 3.1.6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cerulean-studios
nessus
Summary
The AOL Instant Messenger (AIM) protocol handler in Cerulean Studios Trillian allows remote attackers to create files with arbitrary contents via certain aim: URIs, as demonstrated by a URI that begins with the "aim: &c:\" substring and contains a full pathname in the ini field. NOTE: this can be leveraged for code execution by writing to a Startup folder.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Windows |
NASL id | TRILLIAN_3_1_7_0.NASL |
description | The version of Trillian installed on the remote host contains a buffer overflow in its AIM protocol URI handler in |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 25757 |
published | 2007-07-23 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/25757 |
title | Trillian aim:// URI Handler Vulnerabilities |
code |
|