Mandriva Linux Security Advisory : silc-toolkit (MDVSA-2009:234-2)

This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Multiple vulnerabilities was discovered and corrected in
silc-toolkit :

Multiple format string vulnerabilities in
lib/silcclient/client_entry.c in Secure Internet Live Conferencing
(SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow
remote attackers to execute arbitrary code via format string
specifiers in a nickname field, related to the (1)
silc_client_add_client, (2) silc_client_update_client, and (3)
silc_client_nickname_format functions (CVE-2009-3051).

The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in
Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows
remote attackers to overwrite a stack location and possibly execute
arbitrary code via a crafted OID value, related to incorrect use of a
%lu format string (CVE-2008-7159).

The silc_http_server_parse function in lib/silchttp/silchttpserver.c
in the internal HTTP server in silcd in Secure Internet Live
Conferencing (SILC) Toolkit before 1.1.9 allows remote attackers to
overwrite a stack location and possibly execute arbitrary code via a
crafted Content-Length header, related to incorrect use of a %lu
format string (CVE-2008-7160).

Multiple format string vulnerabilities in lib/silcclient/command.c in
Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and
SILC Client 1.1.8 and earlier, allow remote attackers to execute
arbitrary code via format string specifiers in a channel name, related
to (1) silc_client_command_topic, (2) silc_client_command_kick, (3)
silc_client_command_leave, and (4) silc_client_command_users
(CVE-2009-3163).

This update provides a solution to these vulnerabilities.

Update :

Packages for MES5 was not provided previousely, this update addresses
this problem.

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 6.5
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 40997 (mandriva_MDVSA-2009-234.nasl)

Bugtraq ID: 36194

CVE ID: CVE-2008-7159
CVE-2008-7160
CVE-2009-3051
CVE-2009-3163

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now