// For flags

CVE-2008-1552

 

Severity Score

6.8
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow. NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.

La función silc_pkcs1_decode de la librería silccrypt (silcpkcs1.c) en Secure Internet Live Conferencing (SILC) Toolkit antes de 1.1.7, SILC Client antes de 1.1.4 y SILC Server antes de 1.1.2 permite a atacantes remotos ejecutar código de su elección a través de un mensaje PKCS#1 manipulado, lo que dispara un desbordamiento inferior de entero, un error de signo y un desbordamiento de búfer. NOTA: el investigador lo describe como un desbordamiento de entero, pero CVE utiliza el término "desbordamiento inferior" en casos de estrechamiento de resta sin signo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-03-31 CVE Reserved
  • 2008-03-31 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-09-02 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-189: Numeric Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Silc
Search vendor "Silc"
Silc
Search vendor "Silc" for product "Silc"
*-
Affected
in Redhat
Search vendor "Redhat"
Fedora
Search vendor "Redhat" for product "Fedora"
7
Search vendor "Redhat" for product "Fedora" and version "7"
-
Safe
Silc
Search vendor "Silc"
Silc
Search vendor "Silc" for product "Silc"
*-
Affected
in Redhat
Search vendor "Redhat"
Fedora
Search vendor "Redhat" for product "Fedora"
8
Search vendor "Redhat" for product "Fedora" and version "8"
-
Safe
Silc
Search vendor "Silc"
Silc Client
Search vendor "Silc" for product "Silc Client"
<= 1.1.3
Search vendor "Silc" for product "Silc Client" and version " <= 1.1.3"
-
Affected
Silc
Search vendor "Silc"
Silc Server
Search vendor "Silc" for product "Silc Server"
<= 1.1.2
Search vendor "Silc" for product "Silc Server" and version " <= 1.1.2"
-
Affected
Silc
Search vendor "Silc"
Silc Toolkit
Search vendor "Silc" for product "Silc Toolkit"
<= 1.1.6
Search vendor "Silc" for product "Silc Toolkit" and version " <= 1.1.6"
-
Affected