Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.66413
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2009:234-2 (silc-toolkit)
Zusammenfassung:The remote host is missing an update to silc-toolkit;announced via advisory MDVSA-2009:234-2.
Beschreibung:Summary:
The remote host is missing an update to silc-toolkit
announced via advisory MDVSA-2009:234-2.

Vulnerability Insight:
Multiple vulnerabilities was discovered and corrected in silc-toolkit:

Multiple format string vulnerabilities in lib/silcclient/client_entry.c
in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and
SILC Client before 1.1.8, allow remote attackers to execute arbitrary
code via format string specifiers in a nickname field, related to the
(1) silc_client_add_client, (2) silc_client_update_client, and (3)
silc_client_nickname_format functions (CVE-2009-3051).

The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in
Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows
remote attackers to overwrite a stack location and possibly execute
arbitrary code via a crafted OID value, related to incorrect use of
a %lu format string (CVE-2008-7159).

The silc_http_server_parse function in lib/silchttp/silchttpserver.c in
the internal HTTP server in silcd in Secure Internet Live Conferencing
(SILC) Toolkit before 1.1.9 allows remote attackers to overwrite
a stack location and possibly execute arbitrary code via a crafted
Content-Length header, related to incorrect use of a %lu format string
(CVE-2008-7160).

Multiple format string vulnerabilities in lib/silcclient/command.c
in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10,
and SILC Client 1.1.8 and earlier, allow remote attackers to execute
arbitrary code via format string specifiers in a channel name, related
to (1) silc_client_command_topic, (2) silc_client_command_kick,
(3) silc_client_command_leave, and (4) silc_client_command_users
(CVE-2009-3163).

This update provides a solution to these vulnerabilities.

Update:

Packages for MES5 was not provided previously, this update addresses
this problem.

Packages for 2008.0 are being provided due to extended support for
Corporate products.

Affected: 2008.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-3051
BugTraq ID: 35940
http://www.securityfocus.com/bid/35940
Debian Security Information: DSA-1879 (Google Search)
http://www.debian.org/security/2009/dsa-1879
http://www.mandriva.com/security/advisories?name=MDVSA-2009:234
http://www.mandriva.com/security/advisories?name=MDVSA-2009:235
http://www.openwall.com/lists/oss-security/2009/08/31/5
http://www.openwall.com/lists/oss-security/2009/09/03/5
http://secunia.com/advisories/36134
http://secunia.com/advisories/36614
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
http://www.vupen.com/english/advisories/2009/2150
Common Vulnerability Exposure (CVE) ID: CVE-2008-7159
BugTraq ID: 36192
http://www.securityfocus.com/bid/36192
http://secunia.com/advisories/36625
XForce ISS Database: silctoolkit-silcasn1encoder-format-string(53477)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53477
Common Vulnerability Exposure (CVE) ID: CVE-2008-7160
BugTraq ID: 36194
http://www.securityfocus.com/bid/36194
Common Vulnerability Exposure (CVE) ID: CVE-2009-3163
BugTraq ID: 36193
http://www.securityfocus.com/bid/36193
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.