{"vuid":"VU#146785","idnumber":"146785","name":"SETI@home client vulnerable to buffer overflow","keywords":["SETI@home","client","buffer overflow","long string of characters","newline character","\\n"],"overview":"A buffer overflow vulnerability in the SETI@home client could allow a remote attacker to execute arbitrary code or cause the SETI@home client to fail. An exploit for this vulnerability is known to exist and may be circulating.","clean_desc":"From the SETI@home website: SETI@home is a scientific experiment that uses Internet-connected computers in the Search for Extraterrestrial Intelligence (SETI). You can participate by running a free program that downloads and analyzes radio telescope data. A remotely exploitable buffer overflow in the SETI@home client may allow a remote attacker to execute arbitrary code with the privileges of the victim running SETI@home, or cause the SETI@home client to fail. For more details, please see the advisory written by Berend-Jan Wever.","impact":"A remote attacker may be able to execute arbitrary code with the privileges of the victim running SETI@home, or cause the SETI@home client to fail.","resolution":"SETI@home has provided an updated client that resolves this vulnerability.","workarounds":"","sysaffected":"","thanks":"This vulnerability was discovered by Berend-Jan Wever.","author":"This document was written by Ian A Finlay.","public":["http://setiathome.berkeley.edu/","http://spoor12.edup.tudelft.nl/","http://slashdot.org/articles/03/04/06/156217.shtml?tid=172","http://www.neowin.net/comments.php?id=10074&category=software"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-04-07T13:20:09Z","publicdate":"2003-04-06T00:00:00Z","datefirstpublished":"2003-04-07T14:26:36Z","dateupdated":"2003-04-09T13:00:58Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"15","cam_impact":"20","cam_easeofexploitation":"10","cam_attackeraccessrequired":"10","cam_scorecurrent":"14.0625","cam_scorecurrentwidelyknown":"14.0625","cam_scorecurrentwidelyknownexploited":"25.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":14.0625,"vulnote":null}