blob: 812d39c3bc8f7e56f21dea478c5a1e1f439d2f3b [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200804-27">
<title>SILC: Multiple vulnerabilities</title>
Multiple vulnerabilities were found in SILC Client, Server, and Toolkit,
allowing for Denial of Service and execution of arbitrary code.
<product type="ebuild">silc-toolkit silc-client silc-server</product>
<announced>April 24, 2008</announced>
<revised>April 24, 2008: 01</revised>
<package name="net-im/silc-toolkit" auto="yes" arch="*">
<unaffected range="ge">1.1.7</unaffected>
<vulnerable range="lt">1.1.7</vulnerable>
<package name="net-im/silc-client" auto="yes" arch="*">
<unaffected range="ge">1.1.4</unaffected>
<vulnerable range="lt">1.1.4</vulnerable>
<package name="net-im/silc-server" auto="yes" arch="*">
<unaffected range="ge">1.1.2</unaffected>
<vulnerable range="lt">1.1.2</vulnerable>
SILC (Secure Internet Live Conferencing protocol) Toolkit is a software
development kit for use in clients, SILC Server is a communication
server, and SILC Client is an IRSSI-based text client.
<li>Nathan G. Grennan reported a boundary error in SILC Toolkit
within the silc_fingerprint() function in the file
lib/silcutil/silcutil.c when passing overly long data, resulting in a
stack-based buffer overflow (CVE-2008-1227).</li>
<li>A vulnerability
has been reported in SILC Server which is caused due to an error in the
handling of "NEW_CLIENT" packets that do not contain a nickname
<li>Ariel Waissbein, Pedro Varangot, Martin
Mizrahi, Oren Isacson, Carlos Garcia, and Ivan Arce of Core Security
Technologies reported that SILC Client, Server, and Toolkit contain a
vulnerability in the silc_pkcs1_decode() function in the silccrypt
library (silcpkcs1.c), resulting in an integer underflow, signedness
error, and a buffer overflow (CVE-2008-1552).</li>
<impact type="normal">
A remote attacker could exploit these vulnerabilities to cause a Denial
of Service or execute arbitrary code with the privileges of the user
running the application.
There is no known workaround at this time.
All SILC Toolkit users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-toolkit-1.1.7&quot;</code>
All SILC Client users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-client-1.1.4&quot;</code>
All SILC Server users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=net-im/silc-server-1.1.2&quot;</code>
<uri link="">CVE-2008-1227</uri>
<uri link="">CVE-2008-1429</uri>
<uri link="">CVE-2008-1552</uri>
<metadata tag="requester" timestamp="Fri, 21 Mar 2008 02:19:53 +0000">
<metadata tag="bugReady" timestamp="Thu, 03 Apr 2008 14:49:27 +0000">
<metadata tag="submitter" timestamp="Wed, 23 Apr 2008 16:41:55 +0000">