Korean
<< Back
VID 23009
Severity 40
Port 4321
Protocol TCP
Class RWHOIS
Detailed Description The rwhois service appears to be vulnerable to a format string attack. Rwhoisd is a publicly available RWHOIS server daemon for Unix based systems developed and maintained by Network Solutions Inc.
All 1.5x versions of Network Solutions rwhoisd 1.5.7 and below contain a remotely exploitable format string vulnerability. It is possible to overwrite memory by if a client supplies malicious format specifiers as the argument to the '-soa' directive. Attackers may be able to execute arbitrary code on affected hosts.
Recommendation Disable this service, or upgrade to a patched version from:
ftp://ftp.arin.net/pub/rwhois/rwhoisd-1.5.7-1.tar.gz
Related URL CVE-2001-0838 (CVE)
Related URL 3474 (SecurityFocus)
Related URL (ISS)