Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:RWHOISD:RWHOISD-FS

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

rwhoisd Format String

Release Date

2003/04/22

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: rwhoisd Format String


This signature detects attempts to exploit a format string vulnerability in Network Solutions Inc (NSI) rwhoisd 1.5.x. Attackers can access the x86 shellcodes from the original published exploit (gen.c); generic shellcode signatures also match.

Extended Description

Rwhoisd is a publicly available RWHOIS server daemon for Unix based systems developed and maintained by Network Solutions Inc. Rwhoisd contains a remotely exploitable format string vulnerability. It is possible to overwrite memory by if a client supplies malicious format specifiers as the argument to the '-soa' directive. Attackers may be able to execute arbitrary code on affected hosts.

Affected Products

  • Network Solutions rwhoisd 1.5.0
  • Network Solutions rwhoisd 1.5.1 a
  • Network Solutions rwhoisd 1.5.2
  • Network Solutions rwhoisd 1.5.3
  • Network Solutions rwhoisd 1.5.5
  • Network Solutions rwhoisd 1.5.6
  • Network Solutions rwhoisd 1.5.7
  • Network Solutions rwhoisd 1.5.7 .1

References

  • BugTraq: 3474
  • CVE: CVE-2001-0838
  • URL: http://www.kb.cert.org/vuls/id/825275

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out