Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » [email protected] client buffer overflow

[email protected] client buffer overflow

by Mario Miri on April 14th, 2003 Due to insufficient bound checking of server supplied data, [email protected] client program is vulnerable to remote buffer overflow attack. An attacker could execute arbitrary commands on vulnerable server.


Vulnerable:
SETI [email protected] 3.03
SETI [email protected] 3.04
SETI [email protected] 3.05
SETI [email protected] 3.06
SETI [email protected] 3.07


Solution:
FreeBSD, Gentoo Linux have released advisories.
Upgrades are available from
http://setiathome.ssl.berkeley.edu/download.html
.


Discovered by:
Berend-Jan Wever, [email protected]


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »