SILC: Multiple vulnerabilities — GLSA 201006-07

Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code.

Affected packages

net-im/silc-toolkit on all architectures
Affected versions < 1.1.10
Unaffected versions >= 1.1.10
net-im/silc-client on all architectures
Affected versions < 1.1.8
Unaffected versions >= 1.1.8

Background

SILC (Secure Internet Live Conferencing protocol) Toolkit is a software development kit for use in clients, and SILC Client is an IRSSI-based text client.

Description

Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client. For further information please consult the CVE entries referenced below.

Impact

A remote attacker could overwrite stack locations and possibly execute arbitrary code via a crafted OID value, Content-Length header or format string specifiers in a nickname field or channel name.

Workaround

There is no known workaround at this time.

Resolution

All SILC Toolkit users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.10"

All SILC Client users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.8"

References

Release date
June 01, 2010

Latest revision
June 01, 2010: 01

Severity
normal

Exploitable
remote

Bugzilla entries