Vulnerability Description
Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing a long string followed by a \n (newline) character.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| University Of California | Seti At Home | 3.3 |
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004383.html
- http://www.kb.cert.org/vuls/id/146785PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/7292Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11731
- http://lists.grok.org.uk/pipermail/full-disclosure/2003-April/004383.html
- http://www.kb.cert.org/vuls/id/146785PatchThird Party AdvisoryUS Government Resource
- http://www.securityfocus.com/bid/7292Patch
- https://exchange.xforce.ibmcloud.com/vulnerabilities/11731
FAQ
What is CVE-2003-1118?
CVE-2003-1118 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in the SETI@home client 3.03 and other versions allows remote attackers to cause a denial of service (client crash) and execute arbitrary code via a spoofed server response containing ...
How severe is CVE-2003-1118?
CVE-2003-1118 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2003-1118?
Check the references section above for vendor advisories and patch information. Affected products include: University Of California Seti At Home.