CVE-2008-1552

N/A Unknown
Published: March 31, 2008 Modified: April 23, 2026
View on NVD

Description

The silc_pkcs1_decode function in the silccrypt library (silcpkcs1.c) in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.7, SILC Client before 1.1.4, and SILC Server before 1.1.2 allows remote attackers to execute arbitrary code via a crafted PKCS#1 message, which triggers an integer underflow, signedness error, and a buffer overflow. NOTE: the researcher describes this as an integer overflow, but CVE uses the "underflow" term in cases of wraparound from unsigned subtraction.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/29463
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/28373
Source: cve@mitre.org
Patch
http://secunia.com/advisories/29463
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29465
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29622
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29946
Source: af854a3a-2127-422b-91ae-364da2661108
http://security.gentoo.org/glsa/glsa-200804-27.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/3795
Source: af854a3a-2127-422b-91ae-364da2661108
http://silcnet.org/general/news/?item=client_20080320_1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://silcnet.org/general/news/?item=server_20080320_1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://silcnet.org/general/news/?item=toolkit_20080320_1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.coresecurity.com/?action=item&id=2206
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2008:158
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490069/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28373
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securitytracker.com/id?1019690
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/0974/references
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41474
Source: af854a3a-2127-422b-91ae-364da2661108

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.7%
91th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

silc redhat