- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 31639
- Проверка EDB
-
- Пройдено
- Автор
- DAVID130490
- Тип уязвимости
- REMOTE
- Платформа
- PHP
- CVE
- cve-2008-6563
- Дата публикации
- 2008-04-11
Код:
source: https://www.securityfocus.com/bid/28747/info
Trillian is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input.
To exploit this issue, an attacker must entice an unsuspecting user to load a malicious '.dtd' file. Successfully exploiting this issue may allow remote attackers to execute arbitrary code with SYSTEM-level privileges. Failed exploit attempts will cause denial-of-service conditions.
Trillian 3.1.9.0 Basic is vulnerable; other versions may also be affected.
http://www.p1mp4m.es/index.php?act=attach&type=post&id=18
- Источник
- www.exploit-db.com