Exploitation Summary
EIP tracks 1 public exploit for CVE-2007-3832. PoCs published by Nate Mcfeters.
AI-analyzed exploit summary This exploit leverages a URI handling vulnerability in Trillian to execute arbitrary commands via a maliciously crafted 'aim:' URI. The PoC demonstrates command execution by launching calc.exe and writing a file to the startup folder.
Description
Buffer overflow in the AOL Instant Messenger (AIM) protocol handler in AIM.DLL in Cerulean Studios Trillian allows remote attackers to execute arbitrary code via a malformed aim: URI, as demonstrated by a long URI beginning with the aim:///#1111111/ substring.
Exploits (1)
This exploit leverages a URI handling vulnerability in Trillian to execute arbitrary commands via a maliciously crafted 'aim:' URI. The PoC demonstrates command execution by launching calc.exe and writing a file to the startup folder.