Overview
A remotely exploitable format string vulnerability exists in the Referral Whois server daemon (RWhoisd).
Description
| As the Internet has grown, the centralized whois database was not able to scale. In order to deal with scaling the whois system, Referral Whois was developed. Referral Whois uses a de-centralized approach to housing and distributing the whois data. Quoting from RFC 2167: | 
Impact
| Exploitation of this vulnerability may lead to arbitrary code being executed with the privileges of the user running RWhoisd. The RWhois server can run as an unpriviledged user or root. These options are specified in the RWhois server configuration file. | 
Solution
| Obtain a patch from your vendor. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This document was written by Ian Finlay.
Other Information
| CVE IDs: | CVE-2001-0838 | 
| Severity Metric: | 13.39 | 
| Date Public: | 2001-10-25 | 
| Date First Published: | 2001-10-29 | 
| Date Last Updated: | 2001-10-29 19:34 UTC | 
| Document Revision: | 32 |