Get a Pentest and security assessment of your IT network.

Advisories

TPTI-07-06.txt

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cerulean Studios Trillian Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Rendezvous / XMPP (Extensible Messaging and Presence Protocol) messaging subsystem. Trillian locates nearby users through the ‘_presence’ mDNS (multicast DNS) service on UDP port 5353. Once a user is registered through mDNS, messaging is accomplished via XMPP over TCP port 5298.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/56426/TPTI-07-06.txt

Source: https://packetstormsecurity.com/files/56426/TPTI-07-06.txt.html

Related posts
Advisories

57657.html

Advisories

Secunia Security Advisory 17317

Advisories

Ubuntu Security Notice 284-1

Advisories

Hardened-PHP Project Security Advisory 2006-14.139