Vulnerabilities > Cerulean Studios > Trillian > 0.73

DATE CVE VULNERABILITY TITLE RISK
2008-12-10 CVE-2008-5403 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
network
low complexity
cerulean-studios ceruleanstudios CWE-119
critical
10.0
2008-12-10 CVE-2008-5402 Resource Management Errors vulnerability in multiple products
Double free vulnerability in the XML parser in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a crafted XML expression, related to the "IMG SRC ID."
network
low complexity
cerulean-studios ceruleanstudios CWE-399
critical
10.0
2008-12-10 CVE-2008-5401 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Stack-based buffer overflow in the image tooltip implementation in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a long image filename, related to "AIM IMG Tag Parsing."
network
low complexity
cerulean-studios ceruleanstudios CWE-119
critical
10.0
2008-05-23 CVE-2008-2409 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Cerulean Studios Trillian
Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.
network
cerulean-studios CWE-119
critical
9.3
2004-12-31 CVE-2004-2370 Remote Security vulnerability in Cerulean Studios Trillian and Trillian PRO
Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
network
low complexity
cerulean-studios
7.5
2004-12-31 CVE-2004-2304 Remote Boundary Condition Error vulnerability in Cerulean Studios Trillian and Trillian PRO
Integer overflow in Trillian 0.74 and earlier, and Trillian Pro 2.01 and earlier, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow.
network
low complexity
cerulean-studios
7.5
2003-04-02 CVE-2002-1486 Buffer Overflow vulnerability in Cerulean Studios Trillian 0.725/0.73/0.74
Multiple buffer overflows in the IRC component of Trillian 0.73 and 0.74 allows remote malicious IRC servers to cause a denial of service and possibly execute arbitrary code via (1) a large response from the server, (2) a JOIN with a long channel name, (3) a long "raw 221" message, (4) a PRIVMSG with a long nickname, or (5) a long response from an IDENT server.
network
low complexity
cerulean-studios
7.5
2003-04-02 CVE-2002-1485 Remote Denial Of Service vulnerability in Cerulean Studios Trillian 0.73/0.74
The AIM component of Trillian 0.73 and 0.74 allows remote attackers to cause a denial of service (crash) via certain strings such as "P > O < C".
network
low complexity
cerulean-studios
5.0
2002-12-31 CVE-2002-2390 Buffer Errors vulnerability in Cerulean Studios Trillian and Trillian PRO
Buffer overflow in the IDENT daemon (identd) in Trillian 0.6351, 0.725, 0.73, 0.74 and 1.0 pro allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long request.
network
low complexity
cerulean-studios CWE-119
critical
10.0
2002-12-31 CVE-2002-2366 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Cerulean Studios Trillian 0.6351/0.725/0.73
Buffer overflow in the XML parser of Trillian 0.6351, 0.725 and 0.73 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a skin with a long colors file name in trillian.xml.
6.8