<?xml version="1.0" encoding="utf-8"?> <!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> <glsa id="201006-07"> <title>SILC: Multiple vulnerabilities</title> <synopsis> Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code. </synopsis> <product type="ebuild">silc-toolkit silc-client</product> <announced>2010-06-01</announced> <revised count="01">2010-06-01</revised> <bug>284561</bug> <access>remote</access> <affected> <package name="net-im/silc-toolkit" auto="yes" arch="*"> <unaffected range="ge">1.1.10</unaffected> <vulnerable range="lt">1.1.10</vulnerable> </package> <package name="net-im/silc-client" auto="yes" arch="*"> <unaffected range="ge">1.1.8</unaffected> <vulnerable range="lt">1.1.8</vulnerable> </package> </affected> <background> <p> SILC (Secure Internet Live Conferencing protocol) Toolkit is a software development kit for use in clients, and SILC Client is an IRSSI-based text client. </p> </background> <description> <p> Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client. For further information please consult the CVE entries referenced below. </p> </description> <impact type="normal"> <p> A remote attacker could overwrite stack locations and possibly execute arbitrary code via a crafted OID value, Content-Length header or format string specifiers in a nickname field or channel name. </p> </impact> <workaround> <p> There is no known workaround at this time. </p> </workaround> <resolution> <p> All SILC Toolkit users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.10"</code> <p> All SILC Client users should upgrade to the latest version: </p> <code> # emerge --sync # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.8"</code> </resolution> <references> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7159">CVE-2008-7159</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7160">CVE-2008-7160</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3051">CVE-2009-3051</uri> <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3163">CVE-2009-3163</uri> </references> <metadata tag="requester" timestamp="2010-05-22T11:17:59Z"> craig </metadata> <metadata tag="submitter" timestamp="2010-05-27T13:36:35Z"> keytoaster </metadata> <metadata tag="bugReady" timestamp="2010-05-27T17:55:42Z"> vorlon </metadata> </glsa>