3/29/2024 0 Comments Trilian chat![]() ![]() It is possible to create a skin for trillian that will trigger a buffer overflow. Subject: Trillian XML parser buffer overflow No solution was available at the time of this entry. The report did not indicate whether this overflow could be used to execute arbitrary code or not.Ī demonstration exploit is provided (trillian.xml file in the '' section): Buffer overflows often result in denial of service conditions or the execution of arbitrary code.Īccording to the report, there is a a buffer overflow in parsing XML files. Impact: Denial of service via network, Execution of arbitrary code via networkĪ buffer overflow vulnerability was reported in the Trillian chat client. Trillian Chat Client Software Has a Buffer Overflow in the XML ParserĬVE Reference: GENERIC-MAP-NOMATCH (Links to External Site) Home | View Topics | Search | Contact Us |Īpplication (Instant Messaging/IRC/Chat) > Trillian Chat Client Software Has a Buffer Overflow in the XML Parser - SecurityTracker ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |