*** This bug is a security vulnerability ***

Public security bug reported:

CVE-2008-1227:
Stack-based buffer overflow in the silc_fingerprint function in 
lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 
1.1.5, and unspecified earlier versions, allows remote attackers to cause a 
denial of service (crash) or possibly execute arbitrary code via long input 
data. NOTE: some of these details are obtained from third party information.

** Affects: silc-toolkit (Ubuntu)
     Importance: High
         Status: Confirmed

** Affects: silc-toolkit (Fedora)
     Importance: Unknown
         Status: Unknown

** Visibility changed to: Public

** Bug watch added: Red Hat Bugzilla #372021
   https://bugzilla.redhat.com/show_bug.cgi?id=372021

** Also affects: silc-toolkit (Fedora) via
   https://bugzilla.redhat.com/show_bug.cgi?id=372021
   Importance: Unknown
       Status: Unknown

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2008-1227

** Changed in: silc-toolkit (Ubuntu)
   Importance: Undecided => High
       Status: New => Confirmed

-- 
[CVE-2008-1227] Stack-based buffer overflow causes DoS
https://bugs.launchpad.net/bugs/202752
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to