![]() |
Trillian affected by Security Flaw
Not too long ago, GAIM was found to have several vulnerabilities allowing execution of arbitrary code due to an overflow. Don't know what that means? That's ok, I don't either. I do know that it's not a good thing and that it can end up in your computer being owned by someone you didn't want it being owned by.
Well, it turns out the Trillian (I believe all versions up to 2.01) is also impacted by the same type of flaw. You can check out the post to the Bugtraq mailing list. You can grab a patch from the Cerulian Studios website |
All times are GMT -5. The time now is 03:02 AM. |
Powered by vBulletin® Version 3.6.5
Copyright ©2000 - 2025, Jelsoft Enterprises Ltd.