Description
Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
Published: 2014-06-02
Score: 9.3 Critical
EPSS: 1.7% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2013-2008 Stack-based buffer overflow in BOINC 6.10.58 and 6.12.34 allows remote attackers to have unspecified impact via multiple file_signature elements.
History

Tue, 08 Jul 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Universityofcalifornia
Universityofcalifornia boinc Client
CPEs cpe:2.3:a:rom_walton:boinc:6.10.58:*:*:*:*:*:*:*
cpe:2.3:a:rom_walton:boinc:6.12.34:*:*:*:*:*:*:*
cpe:2.3:a:universityofcalifornia:boinc_client:6.10.58:*:*:*:*:*:*:*
cpe:2.3:a:universityofcalifornia:boinc_client:6.12.34:*:*:*:*:*:*:*
Vendors & Products Rom Walton
Rom Walton boinc
Universityofcalifornia
Universityofcalifornia boinc Client

Subscriptions

Universityofcalifornia Boinc Client
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T15:20:37.426Z

Reserved: 2013-02-19T00:00:00.000Z

Link: CVE-2013-2019

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2014-06-02T15:55:09.700

Modified: 2026-05-06T22:30:45.220

Link: CVE-2013-2019

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses