[silc-toolkit] [CVE-2008-1552] possible arbitrary code execution
Bug #215002 reported by
disabled.user
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
silc-client (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
silc-server (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned | ||
Bug Description
Binary package hint: silc
Quoting CVE-2008-1552:
'The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow. NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.'
CVE References
Changed in silc-server: | |
status: | New → Confirmed |
Changed in silc-client: | |
status: | New → Confirmed |
To post a comment you must log in.
Is there any reason this wouldn't affect silc-server as well? The source file in question is identical.