Archive of FreeBSD Security general posting, [FreeBSD-Announce] FreeBSD Security Notice FreeBSD-SN-03:02

08/04/03, [FreeBSD-Announce] FreeBSD Security Notice FreeBSD-SN-03:02
From: FreeBSD Security Advisories <>

Generated by MHonArc

CSIM Logo WelcomeCourses
Faculty, Student, Staff
Projects and reports
Conferences, workshop and seminars
Laboratories and reasearch facilities
Information related to CSIM
Information non-related to CSIM
Address, map, phone, etc.

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

To: FreeBSD Security Advisories <>
Subject: [FreeBSD-Announce] FreeBSD Security Notice FreeBSD-SN-03:02
From: FreeBSD Security Advisories <>
Date: Tue, 8 Apr 2003 05:12:05 -0700 (PDT)
List-archive: <>
List-help: <>
List-id: Project Announcements [moderated] <>
List-post: <>
List-subscribe: <>,<>
List-unsubscribe: <>,<>
Mail-from: From Tue Apr 8 19:16:12 2003

Hash: SHA1

FreeBSD-SN-03:02                                              Security Notice
                                                          The FreeBSD Project

Topic:          security issue in SETI@home client
Announced:      2003-04-08

I.   Introduction

A port in the FreeBSD Ports Collection is affected by a security
issue.  Summary information is given below with references and
affected versions.  All versions given refer to the FreeBSD
port/package version numbers.  The listed vulnerabilities are not
specific to FreeBSD unless otherwise noted.

This port is not installed by default, nor is it ``part of FreeBSD''
as such.  The FreeBSD Ports Collection contains thousands of
third-party applications in a ready-to-install format.  FreeBSD makes
no claim about the security of these third-party applications.  See
<URL:> for more information about the
FreeBSD Ports Collection.

II.  Ports

Port name:      astro/setiathome
Affected:       All versions
Status:         Not fixed

Excerpt from Berend-Jan Wever a.k.a. SkyLined's advisory:
``There is a bufferoverflow in the server responds handler. Sending
an overly large string followed by a newline ('\n') character to the
client will trigger this overflow. This has been tested with various
versions of the client. All versions are presumed to have this flaw in
some form.''
Example exploits for FreeBSD and other systems exist.
A new version of SETI@home for FreeBSD is not available at the time
of this security notice.

<URL: >
<URL: >

FreeBSD Security Notices are communications from the Security Officer
intended to inform the user community about potential security issues,
such as bugs in the third-party applications found in the Ports
Collection, which will not be addressed in a FreeBSD Security

Feedback on Security Notices is welcome at <>.
Version: GnuPG v1.2.1 (FreeBSD)

_______________________________________________ mailing list
To unsubscribe, send any mail to ""

Previous message sorted by date: [FreeBSD-Announce] FreeBSD Security Notice FreeBSD-SN-03:01
Previous message sorted by thread: [FreeBSD-Announce] FreeBSD Security Notice FreeBSD-SN-03:01
Main Index
Thread Index

CSIM home pageWMailAccount managementCSIM LibraryNetwork test toolsSearch CSIM directories
Contact us: Olivier Nicole CSIM    SET    AIT Last update: Jan 2004