CVE-2008-2409
Published May 23, 2008
Last updated 7 years ago
Overview
- Description
- Stack-based buffer overflow in Cerulean Studios Trillian before 3.1.10.0 allows remote attackers to execute arbitrary code via unspecified attributes in the X-MMS-IM-FORMAT header in an MSN message.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.71:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12BB96CE-AEA5-4644-A41E-F317083B11CF" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0376EA0-9F02-4987-A0A3-A79DE73512F7" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "03C5DC92-EE8F-43A7-8F78-58D01FA4D4A1" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.74i:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BEF2AD0-094A-4AFF-8F20-D39E8BA72EE7" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E747537-D974-48C6-8EAA-6B26F3FBDDA3" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:0.6351:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43DB5092-2D6E-453E-8BBF-0F1766B983D7" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "256C630F-3F51-4825-A7AB-EE20F5B6EB66" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CDD3B6B-7AFD-4AD2-AC9A-9652010D3331" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E189B6C6-A516-4C23-A67F-F1505D977DB5" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D922E4FB-BAD1-45B6-B45D-4B7A3B338EF3" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28B0FC73-E06D-4FCE-8555-E448AE8B468A" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24E329DC-435A-4201-916D-2460A18BA9F2" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CC4D997-E8CB-45B7-860B-7C8BC64C2CF0" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0967000-D0D6-479A-BBCD-E9CCE0C9686C" }, { "criteria": "cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86ED2E92-F8E5-4DDC-A5FD-8B12557BC8F9" } ], "operator": "OR" } ] } ]