Korean
<< Back
VID 15006
Severity 30
Port 79
Protocol TCP
Class FINGER
Detailed Description There is a bug in the remote finger service that allows anyone to read arbitrary files on the remote host, by doing a finger on the name of targeted file.

For instance :

finger /etc/passwd@target

Will display the content of /etc/passwd

* References:
http://www.iss.net/security_center/static/5385.php
http://archives.neohapsis.com/archives/bugtraq/2000-10/0017.html
Recommendation Disable the finger service immediately, or upgrade your finger daemon not to be vulnerable.

To disable the finger daemon started from inetd:
1. Edit the /etc/inetd.conf (or equivalent) file.
2. Locate the line that controls the daemon.
3. Type a # at the beginning of the line to comment out the daemon.
4. Restart inetd.

*Solaris 10, Solaris 11:
# svcadm disable svc:/network/finger:default

*Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/finger and set disable=yes
and then restart xinetd

For more information on GNU finger, see: ftp://prep.ai.mit.edu/pub/gnu/finger-1.37.tar.gz.
Related URL CVE-2000-0915 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)