Vulnerability Description
Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Silc | Silc Toolkit | <= 1.1.5 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
- http://secunia.com/advisories/29174Vendor Advisory
- http://secunia.com/advisories/29323
- http://secunia.com/advisories/29946
- http://security.gentoo.org/glsa/glsa-200804-27.xml
- http://silcnet.org/docs/changelog/SILC%20Toolkit%201.1.6
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:158
- http://www.securityfocus.com/bid/28101Patch
- http://www.vupen.com/english/advisories/2008/0769
- https://bugzilla.redhat.com/show_bug.cgi?id=372021
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41012
- http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00004.html
- http://secunia.com/advisories/29174Vendor Advisory
- http://secunia.com/advisories/29323
- http://secunia.com/advisories/29946
FAQ
What is CVE-2008-1227?
CVE-2008-1227 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attac...
How severe is CVE-2008-1227?
CVE-2008-1227 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-1227?
Check the references section above for vendor advisories and patch information. Affected products include: Silc Silc Toolkit.