| VID |
12071 |
| Severity |
40 |
| Port |
79 |
| Protocol |
TCP |
| Class |
FINGER |
| Detailed Description |
The Finger daemon seems to be vulnerable to a buffer overflow vulnerability. Fingerd is a remote user information server that implements the protocol defined in RFC742. A remote attacker could exploit this vulnerability to execute arbitrary code on the system. One of the first significant computer break-ins that took advantage of a buffer overflow was the Morris worm, and that happened in November 1988. This worm exploited a buffer overflow vulnerability in the finger service.
* References: http://www.goldinc.com/html/maloy/SECURITY/morris_worm.html ftp://coast.cs.purdue.edu/pub/doc/morris_worm
* Platforms Affected: BSD/OS 2.x and earlier |
| Recommendation |
Apply the latest patch for the vulnerable finger service, or disable the affected finger service. |
| Related URL |
(CVE) |
| Related URL |
2 (SecurityFocus) |
| Related URL |
641 (ISS) |
|