Users login

Create an account »


Users login

Home » Hacking News » [email protected] client buffer overflow

[email protected] client buffer overflow

by Mario Miri on April 14th, 2003 Due to insufficient bound checking of server supplied data, [email protected] client program is vulnerable to remote buffer overflow attack. An attacker could execute arbitrary commands on vulnerable server.

SETI [email protected] 3.03
SETI [email protected] 3.04
SETI [email protected] 3.05
SETI [email protected] 3.06
SETI [email protected] 3.07

FreeBSD, Gentoo Linux have released advisories.
Upgrades are available from

Discovered by:
Berend-Jan Wever, [email protected]

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »