Heap-based buffer overflow in the XML parser in the AIM plugin in Trillian before 3.1.12.0 allows remote attackers to execute arbitrary code via a malformed XML tag.
https://exchange.xforce.ibmcloud.com/vulnerabilities/47100
http://www.zerodayinitiative.com/advisories/ZDI-08-079
http://www.vupen.com/english/advisories/2008/3348
http://www.securitytracker.com/id?1021336
http://www.securityfocus.com/bid/32645
http://www.securityfocus.com/archive/1/498936/100/0/threaded
http://securityreason.com/securityalert/4702