Stack-based buffer overflow in Trillian 0.71 up to and including 0.74f and Trillian Pro 1.0 up to and including 2.01 allows remote malicious users to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cerulean studios trillian 0.74c |
||
cerulean studios trillian 0.74d |
||
cerulean studios trillian 0.74 |
||
cerulean studios trillian 0.74b |
||
cerulean studios trillian pro 2.0 |
||
cerulean studios trillian pro 2.01 |
||
cerulean studios trillian 0.71 |
||
cerulean studios trillian 0.725 |
||
cerulean studios trillian 0.73 |
||
cerulean studios trillian 0.74g |
||
cerulean studios trillian pro 1.0 |
||
cerulean studios trillian 0.74e |
||
cerulean studios trillian 0.74f |