GLSA-200804-27 : SILC: Multiple vulnerabilities
High Nessus Plugin ID 32073
SynopsisThe remote Gentoo host is missing one or more security-related patches.
DescriptionThe remote host is affected by the vulnerability described in GLSA-200804-27 (SILC: Multiple vulnerabilities)
Nathan G. Grennan reported a boundary error in SILC Toolkit within the silc_fingerprint() function in the file lib/silcutil/silcutil.c when passing overly long data, resulting in a stack-based buffer overflow (CVE-2008-1227).
A vulnerability has been reported in SILC Server which is caused due to an error in the handling of 'NEW_CLIENT' packets that do not contain a nickname (CVE-2008-1429).
Ariel Waissbein, Pedro Varangot, Martin Mizrahi, Oren Isacson, Carlos Garcia, and Ivan Arce of Core Security Technologies reported that SILC Client, Server, and Toolkit contain a vulnerability in the silc_pkcs1_decode() function in the silccrypt library (silcpkcs1.c), resulting in an integer underflow, signedness error, and a buffer overflow (CVE-2008-1552).
A remote attacker could exploit these vulnerabilities to cause a Denial of Service or execute arbitrary code with the privileges of the user running the application.
There is no known workaround at this time.
SolutionAll SILC Toolkit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-im/silc-toolkit-1.1.7' All SILC Client users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-im/silc-client-1.1.4' All SILC Server users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=net-im/silc-server-1.1.2'