Get a Pentest and security assessment of your IT network.

Advisories

TPTI-07-06.txt

A vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Cerulean Studios Trillian Pro. Authentication is not required to exploit this vulnerability. The specific flaw exists in the Rendezvous / XMPP (Extensible Messaging and Presence Protocol) messaging subsystem. Trillian locates nearby users through the ‘_presence’ mDNS (multicast DNS) service on UDP port 5353. Once a user is registered through mDNS, messaging is accomplished via XMPP over TCP port 5298.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/56426/TPTI-07-06.txt

Source: https://packetstormsecurity.com/files/56426/TPTI-07-06.txt.html

Related posts
Advisories

Secunia Security Advisory 35513

Advisories

Secunia Security Advisory 38533

Advisories

Secunia Security Advisory 41538

Advisories

CSIS2005-1.txt