VYPR
Unrated severityNVD Advisory· Published Dec 10, 2008· Updated Apr 23, 2026

CVE-2008-5403

CVE-2008-5403

Description

Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.

Affected products

55
  • cpe:2.3:a:ceruleanstudios:trillian:*:*:*:*:*:*:*:*+ 45 more
    • cpe:2.3:a:ceruleanstudios:trillian:*:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.50:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.52:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.60:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.61:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.62:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.63:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.635:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.6351:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.70:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.71:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.72:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.725:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74c:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74d:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74e:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74f:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74g:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:0.74i:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:1.0:*:pro:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:2.0:*:pro:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.0:*:basic:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.0:*:pro:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.0.120:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.0.121:*:*:*:*:*:*:*
    • cpe:2.3:a:ceruleanstudios:trillian:3.1.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.10.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.11.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ceruleanstudios:trillian:3.1.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:basic:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1.9.0:*:pro:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1:*:basic:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian:3.1:*:pro:*:*:*:*:*
  • cpe:2.3:a:cerulean_studios:trillian_pro:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:a:cerulean_studios:trillian_pro:*:*:*:*:*:*:*:*
    • cpe:2.3:a:ceruleanstudios:trillian_pro:*:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:2.01:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:3.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:3.1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ceruleanstudios:trillian_pro:3.1.9.0:*:*:*:*:*:*:*
    • cpe:2.3:a:cerulean_studios:trillian_pro:3.1_build_121:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

10

News mentions

0

No linked articles in our index yet.