http://slashdot.org/articles/03/04/06/156217.shtml?tid=17206-04-2003
Jamie noted that an Exploit was found in Seti@Home and there is code exploiting the hole actually running about in the wild. Patches are available for those of you not interested in running a public warez server or DoS client
http://spoor12.edup.tudel...4.2/?Advisories/Seti@home
Maar volgens mij valt het best mee, want je moet de client erin kunnen tricken dat de server op een ander adres zit. Dus kan praktisch alleen lokaal, via ARP poisoning bv.
Er is al een exploit beschikbaar (zelf nog niet gezien, dus geen idee wat ie doet)THE TECHNIQUE
1) Sniffing the information exposed by the seti@home client is trivial and very usefull to a malicious person planning an attack on a network. A passive scan of machines on a network can be made using any packetsniffer to grab the information from the network.
2) All tested clients have similar buffer overflows, which allowed setting eip to an arbitrairy value which can lead to arbitrairy code execution. An attacker would have to reroute the connection the client tries to make to the seti@home webserver to a machine he or she controls. This can be done using various widely available spoofing tools. Seti@home also has the ability to use a HTTP-proxy, an attacker could also use the machine the PROXY runs on as a base for this attack. Routers can also be used as a base for this attack.
3) Exploitation of the bug in the server has offcourse not been tested. Do understand that successfull exploitation of the bug in the server would offer a platform from which ALL seti@home clients can be exploited.
Updates hier: http://setiathome.berkeley.edu/download.html
/moet eigenlijk op de frontpage want er zullen veel mensen hier Seti draaien, maar zag de submit button nergens

Alle versies zijn vulnerable, dus snel updaten or be hacked
[ Voor 4% gewijzigd door Verwijderd op 06-04-2003 22:10 ]