Korean
<< Back
VID 15001
Severity 30
Port 79
Protocol TCP
Class FINGER
Detailed Description There is a bug in the remote cfinger daemon which allows anyone to get the lists of the users of this system, when
issuing the command :

finger search.**@victim

This information has a lot of interest for the crackers, because now that they know the user names list, they just have to brute force their password via another service (telnet,ftp...), they will
be in.

* References:
http://archives.neohapsis.com/archives/bugtraq/1997_2/0328.html
Recommendation Use another finger daemon or Disable the finger service(Comment out the "finger" line in /etc/inetd.conf and revoke the inetd daemon).

*Solaris 10, Solaris 11:
# svcadm disable svc:/network/finger:default

*Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/finger and set disable=yes
and then restart xinetd
Related URL CVE-1999-0259 (CVE)
Related URL (SecurityFocus)
Related URL 1811 (ISS)