First published: Mon Mar 31 2008(Updated: )
The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow. NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Silc Toolkit | <=1.1.6 | |
SILC Client | <=1.1.3 | |
SILC silc-server | <=1.1.2 | |
Fedora | =7 | |
Fedora | =8 | |
SILC silc-server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1552 has been rated as a critical severity vulnerability due to its ability to allow remote code execution.
To fix CVE-2008-1552, upgrade to Secure Internet Live Conferencing (SILC) Toolkit version 1.1.7 or later, SILC Client version 1.1.4 or later, and SILC Server version 1.1.2 or later.
CVE-2008-1552 affects SILC Toolkit versions prior to 1.1.7, SILC Client versions prior to 1.1.4, and SILC Server versions prior to 1.1.2.
CVE-2008-1552 can enable remote attackers to execute arbitrary code through crafted PKCS#1 messages.
There are no known workarounds for CVE-2008-1552; upgrading to the fixed versions is the recommended solution.