Trillian DTD File XML Parser Buffer Overflow Vulnerability

Trillian is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.

To exploit this issue, an attacker must entice an unsuspecting user to load a malicious '.dtd' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will cause denial-of-service conditions.

Trillian Basic is vulnerable; other versions may also be affected.


Privacy Statement
Copyright 2010, SecurityFocus