The seti@home client contains a buffer overflow in the HTTP response handler. A malicious, spoofed seti@home server can exploit this buffer overflow to cause remote code execution on the client. Exploit programs are widely available.
Copyright © 2003-2005 Jacques Vidrine and contributors. Please see the source of this document for full copyright information.