CVE-2003-0520
CVSS5.0
发布时间 :2003-08-18 00:00:00
修订时间 :2016-10-17 22:34:54
NMCOS    

[原文]Trillian 1.0 Pro and 0.74 Freeware allows remote attackers to cause a denial of service (crash) via a TypingUser message in which the "TypingUser" string has been modified.


[CNNVD]Cerulean Studios Trillian客户端畸形TypingUser远程拒绝服务漏洞(CNNVD-200308-054)

        
        Cerulean Studios Trillian是一款多协议即时通信软件。
        Trillian客户端不正确处理畸形消息,远程攻击者可以利用这个漏洞触发客户端异常,并崩溃。
        通过发送损坏的'TypingUser'消息,如把'TypingUser'代替为任意字符,发送给客户端可导致Trillian崩溃。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:cerulean_studios:trillian:1.0
cpe:/a:cerulean_studios:trillian:0.74

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0520
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0520
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200308-054
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=105735714318026&w=2
(UNKNOWN)  BUGTRAQ  20030704 Trillian Remote DoS
http://www.securityfocus.com/bid/8107
(VENDOR_ADVISORY)  BID  8107

- 漏洞信息

Cerulean Studios Trillian客户端畸形TypingUser远程拒绝服务漏洞
中危 其他
2003-08-18 00:00:00 2005-10-20 00:00:00
远程  
        
        Cerulean Studios Trillian是一款多协议即时通信软件。
        Trillian客户端不正确处理畸形消息,远程攻击者可以利用这个漏洞触发客户端异常,并崩溃。
        通过发送损坏的'TypingUser'消息,如把'TypingUser'代替为任意字符,发送给客户端可导致Trillian崩溃。
        

- 公告与补丁

        厂商补丁:
        Cerulean Studios
        ----------------
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.ceruleanstudios.com/

- 漏洞信息

10801
Trillian Malformed TypingUser String DoS
Remote / Network Access Denial of Service
Loss of Integrity, Loss of Availability
Exploit Public

- 漏洞描述

Trillian contains a flaw that may allow a remote denial of service. The issue is triggered when an instant message is received with a malformed "TypingUser" string, and will result in loss of availability for the service.

- 时间线

2003-07-04 2003-07-04
2003-07-04 Unknow

- 解决方案

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

- 相关参考

- 漏洞作者

- 漏洞信息

Cerulean Studios Trillian Client Malformed TypingUser Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 8107
Yes No
2003-07-04 12:00:00 2009-07-11 10:56:00
Discovery of this vulnerability has been credited to flur <flur@flurnet.org>.

- 受影响的程序版本

Cerulean Studios Trillian 1.0
Cerulean Studios Trillian 0.74

- 漏洞讨论

Cerulean Studios Trillian client has been reported prone to a remotely exploitable denial of service vulnerability.

It has been reported that when a vulnerable client receives a malformed message, an internal exception will be triggered in the Trillian client and the client will likely fail.

- 漏洞利用

This vulnerability may be exploited using a modified Trillian client.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站