*** This bug is a security vulnerability *** Public security bug reported:
CVE-2008-1227: Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data. NOTE: some of these details are obtained from third party information. ** Affects: silc-toolkit (Ubuntu) Importance: High Status: Confirmed ** Affects: silc-toolkit (Fedora) Importance: Unknown Status: Unknown ** Visibility changed to: Public ** Bug watch added: Red Hat Bugzilla #372021 https://bugzilla.redhat.com/show_bug.cgi?id=372021 ** Also affects: silc-toolkit (Fedora) via https://bugzilla.redhat.com/show_bug.cgi?id=372021 Importance: Unknown Status: Unknown ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2008-1227 ** Changed in: silc-toolkit (Ubuntu) Importance: Undecided => High Status: New => Confirmed -- [CVE-2008-1227] Stack-based buffer overflow causes DoS https://bugs.launchpad.net/bugs/202752 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs