Описание
Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.
Ссылки
- PatchThird Party AdvisoryUS Government Resource
- Patch
- PatchThird Party AdvisoryUS Government Resource
- Patch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:university_of_california:seti_at_home:3.3:*:*:*:*:*:*:*
cpe:2.3:a:university_of_california:seti_at_home:3.4:*:*:*:*:*:*:*
cpe:2.3:a:university_of_california:seti_at_home:3.5:*:*:*:*:*:*:*
cpe:2.3:a:university_of_california:seti_at_home:3.6:*:*:*:*:*:*:*
cpe:2.3:a:university_of_california:seti_at_home:3.7:*:*:*:*:*:*:*
EPSS
Процентиль: 96%
0.24355
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
больше 21 года назад
Buffer overflow in the SETI@home client 3.03 and other versions allows ...
github
больше 3 лет назад
Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.
EPSS
Процентиль: 96%
0.24355
Средний
7.5 High
CVSS2
Дефекты
NVD-CWE-Other