Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.
| Software | From | Fixed in |
|---|---|---|
| university_of_california / seti_at_home | 3.3 | 3.3.x |
| university_of_california / seti_at_home | 3.6 | 3.6.x |
| university_of_california / seti_at_home | 3.7 | 3.7.x |
| university_of_california / seti_at_home | 3.4 | 3.4.x |
| university_of_california / seti_at_home | 3.5 | 3.5.x |