Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a n (newline) character.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Seti_at_home | University_of_california | 3.3 (including) | 3.3 (including) |
Seti_at_home | University_of_california | 3.4 (including) | 3.4 (including) |
Seti_at_home | University_of_california | 3.5 (including) | 3.5 (including) |
Seti_at_home | University_of_california | 3.6 (including) | 3.6 (including) |
Seti_at_home | University_of_california | 3.7 (including) | 3.7 (including) |