First published: Tue Mar 31 2009(Updated: )
Buffer overflow in the XML parser in Trillian 3.1.9.0, and possibly earlier, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DTD file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ceruleanstudios Trillian | =3.1.9.0 | |
Ceruleanstudios Trillian | =3.1.9.0 | |
Ceruleanstudios Trillian | =3.1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-6563 has a high severity rating due to its potential to cause a denial of service and execute arbitrary code.
To fix CVE-2008-6563, upgrade to a patched version of Trillian that addresses the buffer overflow in the XML parser.
CVE-2008-6563 affects Trillian version 3.1.9.0 and possibly earlier versions.
CVE-2008-6563 facilitates remote denial of service attacks and potentially allows for arbitrary code execution.
No formal workaround for CVE-2008-6563 is known, so upgrading to a secure version is recommended.