Format string vulnerability in Network Solutions Rwhoisd 1.5.7.2 and earlier, when using syslog, allows remote attackers to corrupt memory and possibly execute arbitrary code via a rwhois request that contains format specifiers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rwhoisd | Network_solutions | 1.5 (including) | 1.5 (including) |
Rwhoisd | Network_solutions | 1.5.1a (including) | 1.5.1a (including) |
Rwhoisd | Network_solutions | 1.5.2 (including) | 1.5.2 (including) |
Rwhoisd | Network_solutions | 1.5.3 (including) | 1.5.3 (including) |
Rwhoisd | Network_solutions | 1.5.5 (including) | 1.5.5 (including) |
Rwhoisd | Network_solutions | 1.5.6 (including) | 1.5.6 (including) |
Rwhoisd | Network_solutions | 1.5.7 (including) | 1.5.7 (including) |
Rwhoisd | Network_solutions | 1.5.7.1 (including) | 1.5.7.1 (including) |
Rwhoisd | Network_solutions | 1.5.7.2 (including) | 1.5.7.2 (including) |