Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code.
Package | net-im/silc-toolkit on all architectures |
---|---|
Affected versions | < 1.1.10 |
Unaffected versions | >= 1.1.10 |
Package | net-im/silc-client on all architectures |
---|---|
Affected versions | < 1.1.8 |
Unaffected versions | >= 1.1.8 |
SILC (Secure Internet Live Conferencing protocol) Toolkit is a software development kit for use in clients, and SILC Client is an IRSSI-based text client.
Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client. For further information please consult the CVE entries referenced below.
A remote attacker could overwrite stack locations and possibly execute arbitrary code via a crafted OID value, Content-Length header or format string specifiers in a nickname field or channel name.
There is no known workaround at this time.
All SILC Toolkit users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.10"
All SILC Client users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.8"
Release date
June 01, 2010
Latest revision
June 01, 2010: 01
Severity
normal
Exploitable
remote
Bugzilla entries