SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.
fcb278f22cea61ba6e3d6e49af9de50111f5c8565408054d828af262fc0fe293
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.
8cedf2f3c15322296afe094de60504bc27e349f1942713a2f322c7ef6ad5089e
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
7e0c3f73471b54ba55f5ac42979ed0d642afd8ae18a973c16b2a667c6c72db56
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
34a6f1b786f5c4d4138ffc5b2596e6709531e8ce8dc1cd1764362a8329ec53dc
Red Hat Security Advisory 2011-1820-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the AOL Open System for Communication in Realtime protocol plug-in in Pidgin, used by the AOL ICQ and AIM instant messaging systems, escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted OSCAR message. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters in channel messages. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message.
46920b2be0ad0a71dc0f6800ddcb5927c42aa93032c295654bdee52801a20d3f
Mandriva Linux Security Advisory 2011-183 - When receiving various stanzas related to voice and video chat, the XMPP protocol plugin failed to ensure that the incoming message contained all required fields, and would crash if certain fields were missing. When receiving various messages related to requesting or receiving authorization for adding a buddy to a buddy list, the oscar protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. When receiving various incoming messages, the SILC protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash. This update provides pidgin 2.10.1, which is not vulnerable to these issues.
2d414ceea15e43838e4951396fac9e14dee36394f9b458f9c9cc1ccd87f5eee1
Red Hat Security Advisory 2011-1371-01 - Pidgin is an instant messaging program which can log in to multiple accounts on multiple instant messaging networks simultaneously. An input sanitization flaw was found in the way the Pidgin SILC protocol plug-in escaped certain UTF-8 characters. A remote attacker could use this flaw to crash Pidgin via a specially-crafted SILC message. Multiple NULL pointer dereference flaws were found in the way the Pidgin Yahoo! Messenger Protocol plug-in handled malformed YMSG packets. A remote attacker could use these flaws to crash Pidgin via a specially-crafted notification message.
f0ad974a63999ee0a2da67fe7b5c6434dc5657a1919e71a6c7d833f173143ae6
Debian Linux Security Advisory 2038-3 - The packages for Pidgin released as DSA 2038-2 had a regression, as they unintentionally disabled the Silc, Simple, and Yahoo instant messaging protocols. This update restore that functionality. Several remote vulnerabilities have been discovered in Pidgin, a multi protocol instant messaging client. Crafted nicknames in the XMPP protocol can crash Pidgin remotely. Remote contacts may send too many custom smilies, crashing Pidgin.
e167ab2c3a9029ef4b4afd8f25fc54a104528ce4117d118636049500e1ac4f42
Secunia Security Advisory - Gentoo has issued an update for silc-toolkit and silc-client. This fixes multiple vulnerabilities that can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
96b38469b81f9442fe9edccf6898139f76777ee1fda2945f81958410c5690c44
Gentoo Linux Security Advisory 201006-7 - Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client, the worst of which allowing for execution of arbitrary code. Multiple vulnerabilities were discovered in SILC Toolkit and SILC Client. For further information please consult the CVE entries referenced below. Versions less than 1.1.10 are affected.
09c6f320cb1842d1cf2f553bd190328e48a36e499ce25f06245ec682f1c95c8b
Mandriva Linux Security Advisory 2009-234 - Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions. The silc_asn1_encoder function in lib/silcasn1/silcasn1_encode.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.8 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted OID value, related to incorrect use of a %lu format string. The silc_http_server_parse function in lib/silchttp/silchttpserver.c in the internal HTTP server in silcd in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.9 allows remote attackers to overwrite a stack location and possibly execute arbitrary code via a crafted Content-Length header, related to incorrect use of a %lu format string. Multiple format string vulnerabilities in lib/silcclient/command.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client 1.1.8 and earlier, allow remote attackers to execute arbitrary code via format string specifiers in a channel name, related to (1) silc_client_command_topic, (2) silc_client_command_kick, (3) silc_client_command_leave, and (4) silc_client_command_users. This update provides a solution to these vulnerabilities. Packages for MES5 was not provided previously, this update addresses this problem. Packages for 2008.0 are being provided due to extended support for Corporate products.
ae55c02dbd7ddd57b43075845ae46ba5e33dc5158dd2ff5097cba115e8693937
Mandriva Linux Security Advisory 2009-235 - Multiple format string vulnerabilities in lib/silcclient/client_entry.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client before 1.1.8, allow remote attackers to execute arbitrary code via format string specifiers in a nickname field, related to the (1) silc_client_add_client, (2) silc_client_update_client, and (3) silc_client_nickname_format functions. Multiple format string vulnerabilities in lib/silcclient/command.c in Secure Internet Live Conferencing (SILC) Toolkit before 1.1.10, and SILC Client 1.1.8 and earlier, allow remote attackers to execute arbitrary code via format string specifiers in a channel name, related to (1) silc_client_command_topic, (2) silc_client_command_kick, (3) silc_client_command_leave, and (4) silc_client_command_users. This update provides a solution to these vulnerabilities.
cf29ab20dfb02d1acfb394baa328e5ca9ba75bc356f74d70e641c7d0d2e54046
Mandriva Linux Security Advisory 2009-234-1 - Multiple vulnerabilities was discovered and corrected in silc-toolkit. Packages for MES5 was not provided previously, this update addresses this problem.
a51514cfad73cb0fd5f059dc25c98f0dd860e2efc681c5539304259b50a7f217
Mandriva Linux Security Advisory 2009-234 - Multiple vulnerabilities was discovered and corrected in silc-toolkit.
d2d335c7fee04bb290f003b33d57677946c5ac8ee24f25bc7797d651892312ab
Secunia Security Advisory - Fedora has issued an update for libsilc. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
822e14b7fd3c0b03b63d019425b3ac2cb79d9f62d70d3bf853434dfde137b7ca
Secunia Security Advisory - Some vulnerabilities have been reported in SILC Toolkit and SILC Server, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
8d3879a8e704c0e6f9481ddd1e36f38d3eaeada3bc9622e574a89cdfcf573dab
Secunia Security Advisory - Debian has issued an update for silc-client and silc-toolkit. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
d998a6dcc99081fac17df7fdf541f7f477a47227adae827db4911c6c4a6321e3
Debian Security Advisory 1879-1 - Several vulnerabilities have been discovered in the software suite for the SILC protocol, a network protocol designed to provide end-to-end security for conferencing services.
a579706ca3462dbced3ea936bf4e6108a3458c47e92f30831ef87990788d6e50
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all server related files.
4f53535374f08f797d2eadd5928a681f54a430e40ded0dbc5e9fbc2a60e87a78
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all client related files.
aac435e4fbe37ef1aabafcbc4ab224e29b76d23439ca75f4c4945d8164ed71d2
Secunia Security Advisory - A vulnerability has been reported in SILC Client, which can potentially be exploited by malicious people to compromise a user's system.
596d1cd5c3fa92f8819c6406a263fdda20814fb3fefa995538cdc500c1976cf6
SILC (Secure Internet Live Conferencing) is a protocol which provides secure conferencing services in the Internet. It can be used to send any kind of messages, in addition to normal text messages. This includes multimedia messages like images, video, and audio stream. All messages in the SILC network are encrypted and authenticated, and messages can also be digitally signed. SILC protocol supports AES, SHA-1, PKCS#1, PKCS#3, X.509, OpenPGP, and is being developed in the IETF. This tarball holds all developer related files.
cae36cb446c7568e8b01c626484c073751502c1d81eef6c75bd2ac28b227490c
Mandriva Linux Security Advisory - A vulnerability was found in the SILC toolkit before version 1.1.5 that allowed a remote attacker to cause a denial of service (crash), or possibly execute arbitrary code via long input data. A vulnerability was found in the SILC toolkit before version 1.1.7 that allowed a remote attacker to execute arbitrary code via a crafted PKCS#2 message. The updated packages have been patched to correct these issues.
a6246e638af0f7a654428976717fba9322b2f95dd97b095178a6710a2f14b6cb
Secunia Security Advisory - Gentoo has issued an update for silc. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
7e30d1a154bb348046853cc842e0dfa6b862f8710540dfa481cfbb2ec8f7343d
Gentoo Linux Security Advisory GLSA 200804-27 - Nathan G. Grennan reported a boundary error in SILC Toolkit within the silc_fingerprint() function in the file lib/silcutil/silcutil.c when passing overly long data, resulting in a stack-based buffer overflow. Versions less than 1.1.7 are affected.
c557c30f29c0f4d1061cf1d2c155c8d080bd5855a83bc9d1cbe8d1d1f91c09da
Secunia Security Advisory - A vulnerability has been reported in SILC Server, which can be exploited by malicious people to cause a DoS (Denial of Service).
7ee0da3f13c5a3d20e039ea11b6775a98e9d27ac141974991b443c58ba8ce576