Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64907
Category:Mandrake Local Security Checks
Title:Mandrake Security Advisory MDVSA-2009:234-1 (silc-toolkit)
Summary:The remote host is missing an update to silc-toolkit;announced via advisory MDVSA-2009:234-1.
Description:Summary:
The remote host is missing an update to silc-toolkit
announced via advisory MDVSA-2009:234-1.

Vulnerability Insight:
Multiple vulnerabilities was discovered and corrected in silc-toolkit:

Multiple format string vulnerabilities in lib/silcclient/client_entry.c
in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and
SILC Client before 1.1.8, allow remote attackers to execute arbitrary
code via format string specifiers in a nickname field, related to the
(1) silc_client_add_client, (2) silc_client_update_client, and (3)
silc_client_nickname_format functions (CVE-2009-3051).

The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in
Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows
remote attackers to overwrite a stack location and possibly execute
arbitrary code via a crafted OID value, related to incorrect use of
a %lu format string (CVE-2008-7159).

The silc_http_server_parse function in lib/silchttp/silchttpserver.c in
the internal HTTP server in silcd in Secure Internet Live Conferencing
(SILC) Toolkit before 1.1.9 allows remote attackers to overwrite
a stack location and possibly execute arbitrary code via a crafted
Content-Length header, related to incorrect use of a %lu format string
(CVE-2008-7160).

Multiple format string vulnerabilities in lib/silcclient/command.c
in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10,
and SILC Client 1.1.8 and earlier, allow remote attackers to execute
arbitrary code via format string specifiers in a channel name, related
to (1) silc_client_command_topic, (2) silc_client_command_kick,
(3) silc_client_command_leave, and (4) silc_client_command_users
(CVE-2009-3163).

This update provides a solution to these vulnerabilities.

Update:

Packages for MES5 was not provided previously, this update addresses
this problem.

Affected: Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-3051
BugTraq ID: 35940
http://www.securityfocus.com/bid/35940
Debian Security Information: DSA-1879 (Google Search)
http://www.debian.org/security/2009/dsa-1879
http://www.mandriva.com/security/advisories?name=MDVSA-2009:234
http://www.mandriva.com/security/advisories?name=MDVSA-2009:235
http://www.openwall.com/lists/oss-security/2009/08/31/5
http://www.openwall.com/lists/oss-security/2009/09/03/5
http://secunia.com/advisories/36134
http://secunia.com/advisories/36614
SuSE Security Announcement: SUSE-SR:2009:016 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
http://www.vupen.com/english/advisories/2009/2150
Common Vulnerability Exposure (CVE) ID: CVE-2008-7159
BugTraq ID: 36192
http://www.securityfocus.com/bid/36192
http://secunia.com/advisories/36625
XForce ISS Database: silctoolkit-silcasn1encoder-format-string(53477)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53477
Common Vulnerability Exposure (CVE) ID: CVE-2008-7160
BugTraq ID: 36194
http://www.securityfocus.com/bid/36194
Common Vulnerability Exposure (CVE) ID: CVE-2009-3163
BugTraq ID: 36193
http://www.securityfocus.com/bid/36193
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.