CVE Vulnerabilities

CVE-2009-3163

Use of Externally-Controlled Format String

Published: Sep 10, 2009 | Modified: Apr 09, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Multiple format string vulnerabilities in lib/silcclient/command.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client 1.1.8 and earlier, allow remote attackers to execute arbitrary code via format string specifiers in a channel name, related to (1) silc_client_command_topic, (2) silc_client_command_kick, (3) silc_client_command_leave, and (4) silc_client_command_users.

Weakness

The product uses a function that accepts a format string as an argument, but the format string originates from an external source.

Affected Software

NameVendorStart VersionEnd Version
Silc_clientSilcnet*1.1.8 (including)
Silc_clientSilcnet1.1.1 (including)1.1.1 (including)
Silc_clientSilcnet1.1.2 (including)1.1.2 (including)
Silc_clientSilcnet1.1.3 (including)1.1.3 (including)
Silc_clientSilcnet1.1.4 (including)1.1.4 (including)
Silc_clientSilcnet1.1.6 (including)1.1.6 (including)
Silc_clientSilcnet1.1.7 (including)1.1.7 (including)
Silc_toolkitSilcnet*1.1.9 (including)
Silc_toolkitSilcnet1.1 (including)1.1 (including)
Silc_toolkitSilcnet1.1.1 (including)1.1.1 (including)
Silc_toolkitSilcnet1.1.2 (including)1.1.2 (including)
Silc_toolkitSilcnet1.1.3 (including)1.1.3 (including)
Silc_toolkitSilcnet1.1.4 (including)1.1.4 (including)
Silc_toolkitSilcnet1.1.5 (including)1.1.5 (including)
Silc_toolkitSilcnet1.1.6 (including)1.1.6 (including)
Silc_toolkitSilcnet1.1.8 (including)1.1.8 (including)
Silc-toolkitUbuntudapper*
Silc-toolkitUbuntuhardy*
Silc-toolkitUbuntuintrepid*
Silc-toolkitUbuntujaunty*
Silc-toolkitUbuntuupstream*

Potential Mitigations

References