Buffer overflow in the AOL Instant Messenger (AIM) protocol handler in AIM.DLL in Cerulean Studios Trillian allows remote malicious users to execute arbitrary code via a malformed aim: URI, as demonstrated by a long URI beginning with the aim:///#1111111/ substring.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cerulean studios trillian 3.1.6.0 |