In association with heise online

05 December 2008, 13:53

Security update for Trillian instant messenger

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

The Zero Day Initiative have identified three vulnerabilities in the Trillian Instant Messenger application. Errors in the processing of XML code can lead to buffer overflows, while another flaw in the XML processing leads to memory corruption. A flaw exists in tooltip handling, which itself relies on generating a XML tag when handling an image, possibly leading to a stack overflow. ZDI rate all three flaws as capable of allowing an unauthenticated user to remotely execute code.

According to the Zero Day Initiative, these bugs affect all versions before version, which was released by Cerulean to fix these security issues and to fix an issue with the MSN engine which was causing crashes.


Print Version | Send by email | Permalink:

  • July's Community Calendar

The H Open

The H Security

The H Developer

The H Internet Toolkit