A remotely exploitable format string vulnerability exists in the Referral Whois server daemon (RWhoisd).
As the Internet has grown, the centralized whois database was not able to scale. In order to deal with scaling the whois system, Referral Whois was developed. Referral Whois uses a de-centralized approach to housing and distributing the whois data.
Quoting from RFC 2167:
RWhois provides a distributed system for the discovery,retrieval, and maintenance of directory information. This system is primarily hierarchical by design. It allows for the deterministic routing of a query based on hierarchical tags, referring the user closer to the maintainer of the information. While RWhois can be considered a generic directory services protocol, it distinguishes itself from other protocols by providing an integrated, hierarchical architecture and query routing mechanism.
Because of a format string vulnerability in the print_error() function in the RWhois server code, an attacker can send specially crafted data to the RWhois server and overwrite certain areas of memory.
Exploitation of this vulnerability may lead to arbitrary code being executed with the privileges of the user running RWhoisd. The RWhois server can run as an unpriviledged user or root. These options are specified in the RWhois server configuration file.
Obtain a patch from your vendor.
Vendor| Status| Date Notified| Date Updated
Arin| | 25 Oct 2001| 29 Oct 2001
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
This document was written by Ian Finlay.