CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
96.1%
Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data. NOTE: some of these details are obtained from third party information.
Vendor | Product | Version | CPE |
---|---|---|---|
silc | silc_toolkit | * | cpe:2.3:a:silc:silc_toolkit:*:*:*:*:*:*:*:* |
silc | silc_toolkit | 1.1 | cpe:2.3:a:silc:silc_toolkit:1.1:*:*:*:*:*:*:* |
silc | silc_toolkit | 1.1.1 | cpe:2.3:a:silc:silc_toolkit:1.1.1:*:*:*:*:*:*:* |
silc | silc_toolkit | 1.1.2 | cpe:2.3:a:silc:silc_toolkit:1.1.2:*:*:*:*:*:*:* |
silc | silc_toolkit | 1.1.3 | cpe:2.3:a:silc:silc_toolkit:1.1.3:*:*:*:*:*:*:* |
silc | silc_toolkit | 1.1.4 | cpe:2.3:a:silc:silc_toolkit:1.1.4:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
secunia.com/advisories/29174
secunia.com/advisories/29323
secunia.com/advisories/29946
security.gentoo.org/glsa/glsa-200804-27.xml
silcnet.org/docs/changelog/SILC%20Toolkit%201.1.6
www.mandriva.com/security/advisories?name=MDVSA-2008:158
www.securityfocus.com/bid/28101
www.vupen.com/english/advisories/2008/0769
bugzilla.redhat.com/show_bug.cgi?id=372021
exchange.xforce.ibmcloud.com/vulnerabilities/41012