[] NeoSense

Trillian 3.1.9 - '.DTD' File XML Parser Buffer Overflow

Author: david130490
type: remote
platform: php
port: 
date_added: 2008-04-11 
date_updated: 2014-02-13 
verified: 1 
codes: CVE-2008-6563;OSVDB-51130 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/28747/info

Trillian is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

To exploit this issue, an attacker must entice an unsuspecting user to load a malicious '.dtd' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will cause denial-of-service conditions.

Trillian 3.1.9.0 Basic is vulnerable; other versions may also be affected.

http://www.p1mp4m.es/index.php?act=attach&type=post&id=18