Gentoo Archives: gentoo-announce

From: Tobias Heinlein <keytoaster@g.o>
To: gentoo-announce@g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200804-27 ] SILC: Multiple vulnerabilities
Date: Thu, 24 Apr 2008 16:34:39
Message-Id: 4810B56D.5040602@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200804-27
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: SILC: Multiple vulnerabilities
9 Date: April 24, 2008
10 Bugs: #212362, #214116, #214812
11 ID: 200804-27
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities were found in SILC Client, Server, and
19 Toolkit, allowing for Denial of Service and execution of arbitrary
20 code.
21
22 Background
23 ==========
24
25 SILC (Secure Internet Live Conferencing protocol) Toolkit is a software
26 development kit for use in clients, SILC Server is a communication
27 server, and SILC Client is an IRSSI-based text client.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 net-im/silc-toolkit < 1.1.7 >= 1.1.7
36 2 net-im/silc-client < 1.1.4 >= 1.1.4
37 3 net-im/silc-server < 1.1.2 >= 1.1.2
38 -------------------------------------------------------------------
39 3 affected packages on all of their supported architectures.
40 -------------------------------------------------------------------
41
42 Description
43 ===========
44
45 * Nathan G. Grennan reported a boundary error in SILC Toolkit within
46 the silc_fingerprint() function in the file lib/silcutil/silcutil.c
47 when passing overly long data, resulting in a stack-based buffer
48 overflow (CVE-2008-1227).
49
50 * A vulnerability has been reported in SILC Server which is caused
51 due to an error in the handling of "NEW_CLIENT" packets that do not
52 contain a nickname (CVE-2008-1429).
53
54 * Ariel Waissbein, Pedro Varangot, Martin Mizrahi, Oren Isacson,
55 Carlos Garcia, and Ivan Arce of Core Security Technologies reported
56 that SILC Client, Server, and Toolkit contain a vulnerability in the
57 silc_pkcs1_decode() function in the silccrypt library (silcpkcs1.c),
58 resulting in an integer underflow, signedness error, and a buffer
59 overflow (CVE-2008-1552).
60
61 Impact
62 ======
63
64 A remote attacker could exploit these vulnerabilities to cause a Denial
65 of Service or execute arbitrary code with the privileges of the user
66 running the application.
67
68 Workaround
69 ==========
70
71 There is no known workaround at this time.
72
73 Resolution
74 ==========
75
76 All SILC Toolkit users should upgrade to the latest version:
77
78 # emerge --sync
79 # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.7"
80
81 All SILC Client users should upgrade to the latest version:
82
83 # emerge --sync
84 # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.4"
85
86 All SILC Server users should upgrade to the latest version:
87
88 # emerge --sync
89 # emerge --ask --oneshot --verbose ">=net-im/silc-server-1.1.2"
90
91 References
92 ==========
93
94 [ 1 ] CVE-2008-1227
95 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227
96 [ 2 ] CVE-2008-1429
97 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1429
98 [ 3 ] CVE-2008-1552
99 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1552
100
101 Availability
102 ============
103
104 This GLSA and any updates to it are available for viewing at
105 the Gentoo Security Website:
106
107 http://security.gentoo.org/glsa/glsa-200804-27.xml
108
109 Concerns?
110 =========
111
112 Security is a primary focus of Gentoo Linux and ensuring the
113 confidentiality and security of our users machines is of utmost
114 importance to us. Any security concerns should be addressed to
115 security@g.o or alternatively, you may file a bug at
116 http://bugs.gentoo.org.
117
118 License
119 =======
120
121 Copyright 2008 Gentoo Foundation, Inc; referenced text
122 belongs to its owner(s).
123
124 The contents of this document are licensed under the
125 Creative Commons - Attribution / Share Alike license.
126
127 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature