Google Talk DXImageTransform HTML Injection Vulnerability
Google Talk is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input.
An attacker may leverage this issue by appending arbitrary script code to a filename extension to have the code execute in the browser of an unsuspecting user in the context of the affected application.
A successful attack may help the attacker steal cookie-based authentication credentials and launch other attacks.
Google Talk 126.96.36.199 is vulnerable; other versions may also be affected.
NOTE: Filesystem limitations for filenames will restrict what an attacker can append to an extension.