First published: Wed Aug 03 2005(Updated: )
Trillian Pro 3.1 build 121, when checking Yahoo e-mail, stores the password in plaintext in a world readable file and does not delete the file after login, which allows local users to obtain sensitive information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cerulean Studios Trillian Pro | =3.1_build_121 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2444 is considered a moderate severity vulnerability due to the exposure of sensitive information.
To fix CVE-2005-2444, ensure that the application is updated to a later version of Trillian Pro that does not store passwords in plaintext.
CVE-2005-2444 specifically affects Trillian Pro version 3.1 build 121.
The risks of CVE-2005-2444 include local users being able to read stored email passwords, leading to unauthorized access.
While CVE-2005-2444 was identified many years ago, it remains a concern for users still employing affected versions without updates.