26th Nov 2001   [SBWID-4872]
	
COMMAND
	Rwhoisd format string buffer overflow
SYSTEMS AFFECTED
	Rwhoisd 1.5 to 1.5.7.2
PROBLEM
	In     alert7     of      NetGuard      Security      Team      advisory
	[http://www.netguard.com.cn/] :
	
	Rwhoisd is a publicly available RWHOIS  server  daemon  for  Unix  based
	systems developed and maintained by Network Solutions Inc.
	
	Rwhoisd   contains   another   remotely   exploitable   format    string
	vulnerability. It is possible to overwrite memory  by  syslog()  if  set
	use-syslog: YES. $ normal default is YES
	
	Attackers may be able to execute arbitrary code on affected hosts.
	
	log()   function   will   call   syslog(syslog_level,message)   if   set
	use-syslog: YES in rwhoisd.conf file. Unfortunately,message  is  a  user
	supplied format string.
	
	
	demo -----
	 
	[alert7@redhat62 ]# telnet 0 4321
	Trying 0.0.0.0...
	Connected to 0.
	Escape character is \'^]\'.
	%rwhois V-1.5:003fff:00 localhost.localdomain (by Network Solutions, Inc. V-1.5.7-1)
	%p%p%p%p  <------input
	%error 230 No Objects Found
	Connection closed by foreign host.
	
	[alert7@redhat62 ]# tail /var/log/messages
	Nov 21 13:04:06 redhat62 rwhoisd[27697]: CLIENT:127.0.0.1: query: 0xbffff8b00xbffff7fc0x808def80x806be4c
	Nov 21 13:04:06 redhat62 rwhoisd[27697]: CLIENT:127.0.0.1: query response: 0 hits
	
	
SOLUTION
	Comming soon.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH