Required CVE Record Information
Description
Buffer overflow in the AOL Instant Messenger (AIM) protocol handler in AIM.DLL in Cerulean Studios Trillian allows remote attackers to execute arbitrary code via a malformed aim: URI, as demonstrated by a long URI beginning with the aim:///#1111111/ substring.
References 7 Total
- exchange.xforce.ibmcloud.com: trillian-aim-bo(35447) vdb-entry
- vupen.com: ADV-2007-2546 vdb-entry
- secunia.com: 26086 third-party-advisory
- archives.neohapsis.com: 20070718 Can CERT VU#786920 be right? mailing-list
- kb.cert.org: VU#786920 third-party-advisory
- http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html
- securityfocus.com: 24927 vdb-entry
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 7 Total
- exchange.xforce.ibmcloud.com: trillian-aim-bo(35447) vdb-entryx_transferred
- vupen.com: ADV-2007-2546 vdb-entryx_transferred
- secunia.com: 26086 third-party-advisoryx_transferred
- archives.neohapsis.com: 20070718 Can CERT VU#786920 be right? mailing-listx_transferred
- kb.cert.org: VU#786920 third-party-advisoryx_transferred
- http://www.xs-sniper.com/nmcfeters/Cross-App-Scripting-2.html x_transferred
- securityfocus.com: 24927 vdb-entryx_transferred