Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2009-3163

Published: 10 September 2009

Multiple format string vulnerabilities in lib/silcclient/command.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client 1.1.8 and earlier, allow remote attackers to execute arbitrary code via format string specifiers in a channel name, related to (1) silc_client_command_topic, (2) silc_client_command_kick, (3) silc_client_command_leave, and (4) silc_client_command_users.

Notes

AuthorNote
kees
Fortify-Source reduces this vulnerability to a DoS

Priority

Medium

Status

Package Release Status
silc-client
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Not vulnerable

intrepid Not vulnerable

jaunty Not vulnerable

karmic Not vulnerable

upstream Needs triage

silc-server
Launchpad, Ubuntu, Debian
dapper Does not exist

hardy Not vulnerable

intrepid Not vulnerable

jaunty Not vulnerable

karmic Not vulnerable

upstream Needs triage

silc-toolkit
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
hardy Ignored

intrepid Ignored

jaunty Ignored

karmic Not vulnerable
(1.1.10-2)
upstream
Released (1.1.10)