seti@home remotely exploitable buffer overflow

ID 0E154A9C-5D7A-11D8-80E3-0020ED76EF5A
Type freebsd
Reporter FreeBSD
Modified 2003-04-08T00:00:00


The seti@home client contains a buffer overflow in the HTTP response handler. A malicious, spoofed seti@home server can exploit this buffer overflow to cause remote code execution on the client. Exploit programs are widely available.