| VID |
23009 |
| Severity |
40 |
| Port |
4321 |
| Protocol |
TCP |
| Class |
RWHOIS |
| Detailed Description |
The rwhois service appears to be vulnerable to a format string attack. Rwhoisd is a publicly available RWHOIS server daemon for Unix based systems developed and maintained by Network Solutions Inc. All 1.5x versions of Network Solutions rwhoisd 1.5.7 and below contain a remotely exploitable format string vulnerability. It is possible to overwrite memory by if a client supplies malicious format specifiers as the argument to the '-soa' directive. Attackers may be able to execute arbitrary code on affected hosts. |
| Recommendation |
Disable this service, or upgrade to a patched version from: ftp://ftp.arin.net/pub/rwhois/rwhoisd-1.5.7-1.tar.gz |
| Related URL |
CVE-2001-0838 (CVE) |
| Related URL |
3474 (SecurityFocus) |
| Related URL |
(ISS) |
|