Bugzilla – Bug 44511
VUL-0: CVE-2003-0709: whois: buffer overflow
Last modified: 2021-09-27 13:09:55 UTC
Hi, this should be fixed in SL9.0/STABLE http://www.zone-h.org/en/advisories/read/id=2925/
<!-- SBZ_reproduce --> whois -g $(perl -e 'printf "A" x 1022')
OK I making patch, please send me p&p files.
Are they needed for SL9.0/STABLE?
The bug was in older distribution too
Created attachment 13666 [details] patchinfo
Created attachment 13667 [details] putonftp
Thomas, the problem is not only with -g option, but with all options which take argument. Could you change it in p&p please?
Created attachment 13669 [details] patchinfog
Created attachment 13670 [details] putonftp
All were submited with p&p.
ok, we just need to wait for overloaded QA.
Petr, is the fix in STABLE for 9.0? QA, when can we have an estimate for this?
Yes, the fix is in STABLE/9.0 too.
approved
CVE-2003-0709
CVE-2003-0709: CVSS v2 Base Score: 7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)