The vulnerability has been reported in Trillian 0.74i, which is a free version of the product distributed by Cerulean Studios.
An advisory from Secunia attached a "moderately critical" rating to the flaw, saying it exists in the MSN Module, which allows the client to connect to Microsoft's chat network.
Secunia said the vulnerability is caused by a boundary error within the MSN module and can be exploited to cause a buffer overflow by passing an overly long string (about 4096 bytes) from an MSN Messenger server.
The link for this article located at Ryan Naraine is no longer available.