Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 27849

Summary: Whois 4.6.6 Command Line Buffer Overrun Vulnerability
Product: Gentoo Linux Reporter: Raimund Specht <raimund>
Component: Current packagesAssignee: Gentoo Security <security>
Status: RESOLVED DUPLICATE    
Severity: critical CC: solar
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://www.securityfocus.com/bid/8483
Whiteboard:
Package list:
Runtime testing required: ---

Description Raimund Specht 2003-09-03 01:55:32 UTC
See http://www.securityfocus.com/bid/8483 (includes patch).

Reproducible: Always
Steps to Reproduce:
Comment 1 Raimund Specht 2003-09-03 02:15:56 UTC
The Gentoo ebuild already contains the proposed fix. Gentoo is therefore NOT directly affected.
Sorry.
Comment 2 solar (RETIRED) gentoo-dev 2003-09-03 10:54:06 UTC
I fixed this bug a while ago.
What kinda bothers me is Zone-H taking credit for discovering this bug, they did nothing of the sort as this bug was known already to deb,redhat,gentoo as one can tell by the dates in all our bug tracking systems.

Please see bug #24860 for more details on the whois buffer overflow and see why the author refuses to fix the software.

*** This bug has been marked as a duplicate of 24860 ***