Vulnerabilities > CVE-2008-5402 - Resource Management Errors vulnerability in multiple products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Nessus
NASL family | Windows |
NASL id | TRILLIAN_3_1_12_0.NASL |
description | The version of Trillian installed on the remote host reportedly contains several vulnerabilities : - A stack-based buffer overflow in the tool tip processing code could allow an unauthenticated attacker to execute arbitrary code with client privileges on the remote system. (ZDI-08-077) - A vulnerability in the XML processing code responsible for handling specially formulated XML could lead to arbitrary code execution on the remote system. (ZDI-08-078) - A vulnerability in XML processing code responsible for handling malformed XML tags could lead to arbitrary code execution on the remote system. (ZDI-08-079) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 35042 |
published | 2008-12-05 |
reporter | This script is Copyright (C) 2008-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/35042 |
title | Trillian < 3.1.12.0 Multiple Vulnerabilities |
code |
|
References
- http://www.securityfocus.com/bid/32645
- http://www.zerodayinitiative.com/advisories/ZDI-08-078
- http://secunia.com/advisories/33001
- http://www.securitytracker.com/id?1021334
- http://blog.ceruleanstudios.com/?p=404
- http://osvdb.org/50473
- http://securityreason.com/securityalert/4701
- http://www.vupen.com/english/advisories/2008/3348
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47098
- http://www.securityfocus.com/archive/1/498933/100/0/threaded