First published: Sat Feb 04 2006(Updated: )
Cerulean Trillian 3.1.0.120 allows remote attackers to cause a denial of service (client crash) via an AIM message containing the Mac encoded Rich Text Format (RTF) escape sequences (1) \'d1, (2) \'d2, (3) \'d3, (4) \'d4, and (5) \'d5. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cerulean Studios Trillian | =3.1.0.120 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0543 is classified as a denial of service vulnerability.
To mitigate CVE-2006-0543, users should avoid accepting AIM messages containing Mac encoded RTF sequences or upgrade to a later version of Cerulean Trillian that addresses this vulnerability.
CVE-2006-0543 specifically affects Cerulean Trillian version 3.1.0.120.
CVE-2006-0543 allows remote attackers to crash the client through crafted AIM messages.
Yes, CVE-2006-0543 can be exploited remotely due to the nature of the denial of service attack via AIM messages.