First published: Thu Jul 12 2007(Updated: )
Buffer overflow in lib/silcclient/client_notify.c of SILC Client and SILC Toolkit before 1.1.2 allows remote attackers to cause a denial of service via "NICK_CHANGE" notifications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SILC Client | =1.1.1 | |
Silc Toolkit | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3728 has a severity level that can lead to a denial of service due to a buffer overflow.
To fix CVE-2007-3728, users should upgrade to SILC Client and SILC Toolkit version 1.1.2 or later.
CVE-2007-3728 affects SILC Toolkit and SILC Client version 1.1.1.
CVE-2007-3728 is classified as a buffer overflow vulnerability.
Yes, CVE-2007-3728 can be exploited remotely through 'NICK_CHANGE' notifications.