Vulnerabilities > CVE-2008-5402 - Resource Management Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."

Vulnerable Configurations

Part Description Count
Application
Cerulean_Studios
50
Application
Ceruleanstudios
5

Common Weakness Enumeration (CWE)

Nessus

NASL familyWindows
NASL idTRILLIAN_3_1_12_0.NASL
descriptionThe version of Trillian installed on the remote host reportedly contains several vulnerabilities : - A stack-based buffer overflow in the tool tip processing code could allow an unauthenticated attacker to execute arbitrary code with client privileges on the remote system. (ZDI-08-077) - A vulnerability in the XML processing code responsible for handling specially formulated XML could lead to arbitrary code execution on the remote system. (ZDI-08-078) - A vulnerability in XML processing code responsible for handling malformed XML tags could lead to arbitrary code execution on the remote system. (ZDI-08-079)
last seen2020-06-01
modified2020-06-02
plugin id35042
published2008-12-05
reporterThis script is Copyright (C) 2008-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/35042
titleTrillian < 3.1.12.0 Multiple Vulnerabilities
code
#
# (C) Tenable Network Security, Inc.
#



include("compat.inc");

if (description)
{
  script_id(35042);
  script_version("1.16");

  script_cve_id("CVE-2008-5401", "CVE-2008-5402", "CVE-2008-5403");
  script_bugtraq_id(32645);
  script_xref(name:"Secunia", value:"33001");

  script_name(english:"Trillian < 3.1.12.0 Multiple Vulnerabilities");
  script_summary(english:"Checks version number of Trillian");

 script_set_attribute(attribute:"synopsis", value:
"The remote host contains an instant messaging application that is
affected by several vulnerabilities." );
 script_set_attribute(attribute:"description", value:
"The version of Trillian installed on the remote host reportedly
contains several vulnerabilities :

  - A stack-based buffer overflow in the tool tip processing
    code could allow an unauthenticated attacker to execute
    arbitrary code with client privileges on the remote
    system. (ZDI-08-077)

  - A vulnerability in the XML processing code responsible
    for handling specially formulated XML could lead to
    arbitrary code execution on the remote system.
    (ZDI-08-078)

  - A vulnerability in XML processing code responsible
    for handling malformed XML tags could lead to
    arbitrary code execution on the remote system.
    (ZDI-08-079)" );
 script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-077/" );
 script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-078/" );
 script_set_attribute(attribute:"see_also", value:"https://www.zerodayinitiative.com/advisories/ZDI-08-079/" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Dec/108" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Dec/109" );
 script_set_attribute(attribute:"see_also", value:"https://seclists.org/fulldisclosure/2008/Dec/110" );
 script_set_attribute(attribute:"see_also", value:"http://web.archive.org/web/20160322091015/http://blog.trillian.im/?p=404" );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Trillian 3.1.12.0 or later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_cwe_id(119, 399);
 script_set_attribute(attribute:"plugin_publication_date", value: "2008/12/05");
 script_cvs_date("Date: 2018/11/15 20:50:29");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:trillian:trillian");
script_end_attributes();


  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2008-2018 Tenable Network Security, Inc.");

  script_dependencies("trillian_installed.nasl");
  script_require_keys("SMB/Trillian/Version");

  exit(0);
}


include("global_settings.inc");


ver = get_kb_item("SMB/Trillian/Version");
if (ver && ver =~ "^([0-2]\.|3\.(0\.|1\.([0-9]|1[01])\.))")
{
  if (report_verbosity)
  {
    report = string(
      "\n",
      "Trillian version ", ver, " is currently installed on the remote host.\n"
    );
    security_hole(port:get_kb_item("SMB/transport"), extra:report);
  }
  else security_hole(get_kb_item("SMB/transport"));
}