Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Trillian | Cerulean_studios | 0.71 (including) | 0.71 (including) |
Trillian | Cerulean_studios | 0.73 (including) | 0.73 (including) |
Trillian | Cerulean_studios | 0.74 (including) | 0.74 (including) |
Trillian | Cerulean_studios | 0.74b (including) | 0.74b (including) |
Trillian | Cerulean_studios | 0.74c (including) | 0.74c (including) |
Trillian | Cerulean_studios | 0.74d (including) | 0.74d (including) |
Trillian | Cerulean_studios | 0.74e (including) | 0.74e (including) |
Trillian | Cerulean_studios | 0.74f (including) | 0.74f (including) |
Trillian | Cerulean_studios | 0.74g (including) | 0.74g (including) |
Trillian | Cerulean_studios | 0.725 (including) | 0.725 (including) |
Trillian_pro | Cerulean_studios | 1.0 (including) | 1.0 (including) |
Trillian_pro | Cerulean_studios | 2.0 (including) | 2.0 (including) |
Trillian_pro | Cerulean_studios | 2.01 (including) | 2.01 (including) |