Bugzilla – Attachment 13666 Details for
Bug 44511
VUL-0: CVE-2003-0709: whois: buffer overflow
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
IDP Log In
|
Forgot Password
patchinfo
patchinfo.whois (text/plain), 627 bytes, created by
Thomas Biege
on 2003-08-29 00:13:24 UTC
(
hide
)
Description:
patchinfo
Filename:
MIME Type:
Creator:
Thomas Biege
Created:
2003-08-29 00:13:24 UTC
Size:
627 bytes
patch
obsolete
>DISTRIBUTION: sles7-i386,sles7-ia64,sles7-ppc,7.2-s390,sles7-s390x,sles8-ppc,sles8-s390,sles8-s390x,ul1-i386,ul1-ia64,ul1-x86_64 >PACKAGE: whois >PACKAGER: postadal@suse.cz >PRESCRIPT: >POSTSCRIPT: >CD-Produkt-Name: >CD-Produkt-Version: >REQUIRES: >CATEGORY: security >INDICATIONS: Everyone using whois with untrusted remote input. >CONTRAINDICATIONS: >PRE: >POST: >DESCRIPTION: >A buffer overflow in whois can be triggered by issuing >a very long argument to the -g option. The little tool >whois is often used in CGI scripts and alike. The >conjunction of untrusted remote input and the buffer >overflow can lead to remote root compromise. > >
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
Attachments on
bug 44511
:
13666
|
13667
|
13669
|
13670