Trillian DTD File XML Parser Buffer Overflow Vulnerability

Trillian is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

To exploit this issue, an attacker must entice an unsuspecting user to load a malicious '.dtd' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will cause denial-of-service conditions.

Trillian 3.1.9.0 Basic is vulnerable; other versions may also be affected.


 

Privacy Statement
Copyright 2010, SecurityFocus