FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

seti@home remotely exploitable buffer overflow

Affected packages
setiathome < 3.0.8

Details

VuXML ID 0e154a9c-5d7a-11d8-80e3-0020ed76ef5a
Discovery 2003-04-08
Entry 2004-02-12

The seti@home client contains a buffer overflow in the HTTP response handler. A malicious, spoofed seti@home server can exploit this buffer overflow to cause remote code execution on the client. Exploit programs are widely available.

References

URL http://setiathome.berkeley.edu/version308.html
URL http://web.archive.org/web/20030609204812/http://spoor12.edup.tudelft.nl/

OSZAR »