Webalizer v2.01-09 contains a remote buffer overflow if DNS lookups are turned on. A compromised DNS server can be used to return hostnames that are too long, executing code as root.
7055a3e82518d1a2f7545979aec64c7bdca857a417b4fd51475fe18fab55e87c
Release : April 15 2002
Author : Spybreak (spybreak@host.sk)
Software : Webalizer
Version : 2.01-09, 2.01-06
URL : http://www.mrunix.net/webalizer/
Status : vendor contacted
Problems : remote buffer overflow
--- INTRO ---
The Webalizer is a web server log file analysis program
which produces usage statistics in HTML format for
viewing with a browser. The results are presented in both
columnar and graphical format, which facilitates
interpretation.
Webalizer 2.01-06 is a part of the Red Hat Linux 7.2
distribution, enabled by default and run daily by the cron
daemon.
--- PROBLEM ---
The webalizer has the ability to perform reverse DNS lookups.
This ability is disabled by default, but if enabled, an
attacker with command over his own DNS service, has the
ability to gain remote root acces to a machine, due to a remote
buffer overflow in the reverse resolving code.
Public key:
http://spybreak.host.sk