Stack-based buffer overflow in Trillian 0.71 through 0.74f and Trillian Pro 1.0 through 2.01 allows remote attackers to execute arbitrary code via a Yahoo Messenger packet with a long key name.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Trillian_pro | Cerulean_studios | 2.0 | 2.0 |
Trillian | Cerulean_studios | 0.71 | 0.71 |
Trillian_pro | Cerulean_studios | 2.01 | 2.01 |
Trillian | Cerulean_studios | 0.74b | 0.74b |
Trillian | Cerulean_studios | 0.74g | 0.74g |
Trillian_pro | Cerulean_studios | 1.0 | 1.0 |
Trillian | Cerulean_studios | 0.74e | 0.74e |
Trillian | Cerulean_studios | 0.73 | 0.73 |
Trillian | Cerulean_studios | 0.725 | 0.725 |
Trillian | Cerulean_studios | 0.74c | 0.74c |
Trillian | Cerulean_studios | 0.74f | 0.74f |
Trillian | Cerulean_studios | 0.74 | 0.74 |
Trillian | Cerulean_studios | 0.74d | 0.74d |