FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

seti@home remotely exploitable buffer overflow

Affected packages
setiathome < 3.0.8

Details

VuXML ID 0e154a9c-5d7a-11d8-80e3-0020ed76ef5a
Discovery 2003-04-08
Entry 2004-02-12

The seti@home client contains a buffer overflow in the HTTP response handler. A malicious, spoofed seti@home server can exploit this buffer overflow to cause remote code execution on the client. Exploit programs are widely available.

References

URL http://setiathome.berkeley.edu/version308.html
URL http://web.archive.org/web/20030609204812/http://spoor12.edup.tudelft.nl/