Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.Referenceshttp://www.securitytracker.com/id?1021336http://www.zerodayinitiative.com/advisories/ZDI-08-079http://www.securityfocus.com/bid/32645http://www.securityfocus.com/archive/1/498936/100/0/threadedhttp://www.vupen.com/english/advisories/2008/3348http://osvdb.org/50474https://exchange.xforce.ibmcloud.com/vulnerabilities/47100http://secunia.com/advisories/33001http://securityreason.com/securityalert/4702http://blog.ceruleanstudios.com/?p=404