发布时间 :2005-05-02 00:00:00
修订时间 :2016-10-17 23:15:16

[原文]Multiple buffer overflows in the (1) AIM, (2) MSN, (3) RSS, and other plug-ins for Trillian 2.0 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header.

[CNNVD]Cerulean Studios Trillian远程HTTP响应缓冲区溢出漏洞(CNNVD-200505-538)

        Trillian 2.0的(1)AIM,(2)MSN,(3)RSS和其他插件存在多个缓冲区溢出,远程web服务器可以通过在HTTP 1.1响应标题内的长字符串发起拒绝服务攻击(应用系统崩溃)。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20050324 LogicLibrary BugScan VSR,Trillian 2.0, 3.0 and 3.1

- 漏洞信息

Cerulean Studios Trillian远程HTTP响应缓冲区溢出漏洞
中危 缓冲区溢出
2005-05-02 00:00:00 2005-10-20 00:00:00
        Trillian 2.0的(1)AIM,(2)MSN,(3)RSS和其他插件存在多个缓冲区溢出,远程web服务器可以通过在HTTP 1.1响应标题内的长字符串发起拒绝服务攻击(应用系统崩溃)。

- 公告与补丁


- 漏洞信息

Trillian Multiple Plugin HTTP Response Header Overflow DoS
Remote / Network Access Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability

- 漏洞描述

A remote overflow exists in Trillian. Trillian fails to properly validate HTTP 1.1 response headers resulting in a buffer overflow. With a specially crafted request, an attacker can cause the execution of malicious code resulting in a loss of integrity.

- 时间线

2005-03-24 2005-03-24
2005-03-24 Unknow

- 解决方案

Upgrade to version 3.1 or higher, as it has been reported to fix this vulnerability except the issues with Yahoo IM. It is also possible to correct the flaw by implementing the following workaround(s): avoid using the Yahoo IM component until patched

- 相关参考

- 漏洞作者

- 漏洞信息

Cerulean Studios Trillian Multiple Remote HTTP Response Buffer Overflow Vulnerabilities
Boundary Condition Error 12890
Yes No
2005-03-23 12:00:00 2009-07-12 11:56:00
Ralph Massaro <> discovered these vulnerabilities.

- 受影响的程序版本

Cerulean Studios Trillian Pro 3.1
Cerulean Studios Trillian Pro 3.0
Cerulean Studios Trillian Pro 2.1
Cerulean Studios Trillian Pro 2.0
Cerulean Studios Trillian Pro 1.0
Cerulean Studios Trillian Pro 2.01
Cerulean Studios Trillian 3.1
Cerulean Studios Trillian 3.0
Cerulean Studios Trillian 2.1
Cerulean Studios Trillian 2.0
Cerulean Studios Trillian 1.0
Cerulean Studios Trillian 0.6351
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 95
- Microsoft Windows 98
- Microsoft Windows ME
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
Cerulean Studios Trillian 0.725
Cerulean Studios Trillian 0.74 i
Cerulean Studios Trillian 0.74
Cerulean Studios Trillian 0.73
Cerulean Studios Trillian 0.71

- 漏洞讨论

It is reported that Trillian is susceptible to multiple remote HTTP response buffer overflow vulnerabilities. These issues are due to a failure of the application to properly bounds check user-supplied data prior to copying it into fixed-sized memory buffers.

It is reported that multiple Trillian modules likely share the same code for making HTTP requests, and therefore multiple modules are vulnerable to the same attack.

Remote attackers may exploit these vulnerabilities to execute arbitrary machine code in the context of vulnerable Trillian clients.

Several of these vulnerabilities are reportedly fixed in version 3.0 of Trillian. Versions 3.0 and 3.1 remain affected by multiple issues in its Yahoo! component. Versions 2.0 up to, but not including 3.0 are reported to be affected in multiple components.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: &lt;;.

- 解决方案

Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 相关参考