Trillian Buffer Overflow Vulnerability

Summary
This host is installed with Trillian and is prone to buffer overflow vulnerability.
Impact
Successful exploitation will let the attacker execute arbitrary code or to cause denial of service.
Solution
Upgrade to Trillian IM Client version 4.2 or later For further updates refer, http://blog.ceruleanstudios.com
Insight
The application fails to perform adequate boundary checks on user supplied data resulting in a parsing error while processing malformed DTD files.
Affected
Trillian IM Client version 3.1.9.0 and prior.
References