First published: Fri May 23 2008(Updated: )
Stack-based buffer overflow in AIM.DLL in Cerulean Studios Trillian before 3.1.10.0 allows user-assisted remote attackers to execute arbitrary code via a long attribute value in a FONT tag in a message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ceruleanstudios Trillian | <=3.1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2407 has a high severity rating due to the potential for remote code execution.
To fix CVE-2008-2407, upgrade to Cerulean Studios Trillian version 3.1.10.0 or later.
The impact of CVE-2008-2407 includes unauthorized code execution if a user interacts with a malicious message.
All versions of Cerulean Studios Trillian prior to 3.1.10.0 are affected by CVE-2008-2407.
CVE-2008-2407 is not a zero-day vulnerability, as it was disclosed and has available fixes.