CVE Vulnerabilities

CVE-2009-3051

Use of Externally-Controlled Format String

Published: Sep 10, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Silc_clientSilcnet*1.1.7 (including)
Silc_clientSilcnet1.1.1 (including)1.1.1 (including)
Silc_clientSilcnet1.1.2 (including)1.1.2 (including)
Silc_clientSilcnet1.1.3 (including)1.1.3 (including)
Silc_clientSilcnet1.1.4 (including)1.1.4 (including)
Silc_clientSilcnet1.1.6 (including)1.1.6 (including)
Silc_toolkitSilcnet*1.1.9 (including)
Silc_toolkitSilcnet1.1 (including)1.1 (including)
Silc_toolkitSilcnet1.1.1 (including)1.1.1 (including)
Silc_toolkitSilcnet1.1.2 (including)1.1.2 (including)
Silc_toolkitSilcnet1.1.3 (including)1.1.3 (including)
Silc_toolkitSilcnet1.1.4 (including)1.1.4 (including)
Silc_toolkitSilcnet1.1.5 (including)1.1.5 (including)
Silc_toolkitSilcnet1.1.6 (including)1.1.6 (including)
Silc_toolkitSilcnet1.1.8 (including)1.1.8 (including)
Silc-clientUbuntuupstream*
Silc-serverUbuntuupstream*
Silc-toolkitUbuntudapper*
Silc-toolkitUbuntuhardy*
Silc-toolkitUbuntuintrepid*
Silc-toolkitUbuntujaunty*
Silc-toolkitUbuntuupstream*

Potential Mitigations

References