Description
Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.
Exploits (1)
References (4)
Scores
EPSS
0.2435
EPSS Percentile
96.1%
Details
Status
published
Products (5)
university_of_california/seti_at_home
3.3
university_of_california/seti_at_home
3.4
university_of_california/seti_at_home
3.5
university_of_california/seti_at_home
3.6
university_of_california/seti_at_home
3.7
Published
Dec 31, 2003
Tracked Since
Feb 18, 2026