Trillian DTD File XML Parser Buffer Overflow Vulnerability

To exploit this issue, an attacker must entice an unsuspecting user to open a malicious file using the affected application.

Proof-of-concept code is available to registered users at the following URI:

http://www.p1mp4m.es/index.php?act=attach&type=post&id=18


 

Privacy Statement
Copyright 2010, SecurityFocus