First published: Fri May 23 2008(Updated: )
Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cerulean Studios Trillian | =3.1.9.0 | |
Cerulean Studios Trillian | =0.71 | |
Cerulean Studios Trillian | =2.0 | |
Cerulean Studios Trillian | =3.1.7.0 | |
Cerulean Studios Trillian | =3.1.5.0 | |
Cerulean Studios Trillian | =0.6351 | |
Cerulean Studios Trillian | =3.1.5.1 | |
Cerulean Studios Trillian | =0.73 | |
Cerulean Studios Trillian | =0.725 | |
Cerulean Studios Trillian | =3.1 | |
Cerulean Studios Trillian | =3.0 | |
Cerulean Studios Trillian | =0.74i | |
Cerulean Studios Trillian | =3.1.6.0 | |
Cerulean Studios Trillian | =0.74 | |
Cerulean Studios Trillian | =2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2409 is classified as a high-severity vulnerability due to its potential for remote code execution.
To fix CVE-2008-2409, users should upgrade to Trillian version 3.1.10.0 or later.
The affected software versions for CVE-2008-2409 include Trillian versions prior to 3.1.10.0.
CVE-2008-2409 is a stack-based buffer overflow vulnerability.
CVE-2008-2409 can be exploited by remote attackers via specially crafted MSN messages.