Trillian Pro and Basic 3.1 Build 121
It is possible to remotely crash Trillian by sending an empty IM with the AOL AIM protocol. This attack is easily repeatable. The attack does not require the Trillian user to accept the message or have the user in their contact list. Trillian will display an incoming message from the attacker, but does not show any text.
The error message upon crash is:
Trillian Basic 3.1 Build 121
Trillian Pro 3.1 Build 121
The blank-message attack was tested against several AIM clients without impact:
Several clients were also tested for blank message problems with the ICQ protocol and had no impact from the attack:
AOL AIM Mac OSX 4.7 does not crash upon receiving a blank message, however it does trigger the "message received" sound without displaying any new message content. If you actually know anyone using this client and have an active chat with them, you can trigger the sound endlessly and annoy the hell out of them.
The username and password to sign onto AIM must be supplied at the start of the script.
The "blankdos" program usage is:
The script will connect to AIM, and prompt the attacker to press "return" when ready to send the attack. It will then disconnect from AIM.
Upgrade to version 188.8.131.52 or higher.
Jericho/attrition.org for being a guinea pig while investigating the Trillian RTF DoS and eventually finding this one, as well as Zel for suffering several unexpected disconnections.
Updated information can be found on OSVDB.org under the following entry:
|OSVDB-23528||Cerulean Studios Trillian Blank AIM Message DoS|