CVE-2008-2409
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
23/05/2008
Last modified:
09/04/2025
Description
Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cerulean_studios:trillian:0.71:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:0.74i:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:0.6351:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1.5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1.5.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1.6.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1.7.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2008-05/0285.html
- http://secunia.com/advisories/30336
- http://securitytracker.com/id?1020106=
- http://www.securityfocus.com/bid/29330
- http://www.vupen.com/english/advisories/2008/1622
- http://www.zerodayinitiative.com/advisories/ZDI-08-031/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42576
- http://archives.neohapsis.com/archives/bugtraq/2008-05/0285.html
- http://secunia.com/advisories/30336
- http://securitytracker.com/id?1020106=
- http://www.securityfocus.com/bid/29330
- http://www.vupen.com/english/advisories/2008/1622
- http://www.zerodayinitiative.com/advisories/ZDI-08-031/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42576