First published: Thu Sep 10 2009(Updated: )
Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SILC Client | =1.1.6 | |
Silc Toolkit | =1.1.3 | |
Silc Toolkit | =1.1.5 | |
Silc Toolkit | <=1.1.9 | |
SILC Client | =1.1.1 | |
SILC Client | =1.1.2 | |
Silc Toolkit | =1.1.8 | |
SILC Client | =1.1.3 | |
SILC Client | <=1.1.7 | |
Silc Toolkit | =1.1 | |
SILC Client | =1.1.4 | |
Silc Toolkit | =1.1.1 | |
Silc Toolkit | =1.1.6 | |
Silc Toolkit | =1.1.4 | |
Silc Toolkit | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3051 has a high severity rating due to the potential for remote code execution.
To fix CVE-2009-3051, upgrade to SILC Toolkit version 1.1.10 or higher, or SILC Client version 1.1.8 or higher.
CVE-2009-3051 affects versions of SILC Client prior to 1.1.8 and SILC Toolkit prior to 1.1.10.
CVE-2009-3051 allows remote attackers to execute arbitrary code through crafted format string specifiers.
Check if you are using an affected version of SILC Client or SILC Toolkit prior to the patched versions to determine vulnerability.