Description
Format string vulnerability in Network Solutions Rwhoisd 1.5.7.2 and earlier, when using syslog, allows remote attackers to corrupt memory and possibly execute arbitrary code via a rwhois request that contains format specifiers.
Product(s):
- Network Solutions rwhoisd 1.5.1a
- Network Solutions rwhoisd 1.5.2
- Network Solutions rwhoisd 1.5.3
- Network Solutions rwhoisd 1.5.5
- Network Solutions rwhoisd 1.5.6
- Network Solutions rwhoisd 1.5.7.1
- Network Solutions rwhoisd 1.5.7.2
- Network Solutions rwhoisd 1.5.7
- Network Solutions rwhoisd 1.5
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2001-0913, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2001-0913 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.