Required CVE Record Information
Description
Heap-based buffer overflow in Cerulean Studios Trillian 3.x before 3.1.6.0 allows remote attackers to execute arbitrary code via a message sent through the MSN protocol, or possibly other protocols, with a crafted UTF-8 string, which triggers improper memory allocation for word wrapping when a window width is used as a buffer size, a different vulnerability than CVE-2007-2478.
References 9 Total
- kb.cert.org: VU#187033 third-party-advisory
- vupen.com: ADV-2007-2246 vdb-entry
- exchange.xforce.ibmcloud.com: trillian-utf8-bo(34918) vdb-entry
- securityfocus.com: 24523 vdb-entry
- securitytracker.com: 1018265 vdb-entry
- http://blog.ceruleanstudios.com/?p=150
- osvdb.org: 37446 vdb-entry
- labs.idefense.com: 20070618 Cerulean Studios Trillian UTF-8 Word Wrap Heap Overflow Vulnerability third-party-advisory
- secunia.com: 25736 third-party-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 9 Total
- kb.cert.org: VU#187033 third-party-advisoryx_transferred
- vupen.com: ADV-2007-2246 vdb-entryx_transferred
- exchange.xforce.ibmcloud.com: trillian-utf8-bo(34918) vdb-entryx_transferred
- securityfocus.com: 24523 vdb-entryx_transferred
- securitytracker.com: 1018265 vdb-entryx_transferred
- http://blog.ceruleanstudios.com/?p=150 x_transferred
- osvdb.org: 37446 vdb-entryx_transferred
- labs.idefense.com: 20070618 Cerulean Studios Trillian UTF-8 Word Wrap Heap Overflow Vulnerability third-party-advisoryx_transferred
- secunia.com: 25736 third-party-advisoryx_transferred