| VID |
15006 |
| Severity |
30 |
| Port |
79 |
| Protocol |
TCP |
| Class |
FINGER |
| Detailed Description |
There is a bug in the remote finger service that allows anyone to read arbitrary files on the remote host, by doing a finger on the name of targeted file.
For instance :
finger /etc/passwd@target
Will display the content of /etc/passwd
* References: http://www.iss.net/security_center/static/5385.php http://archives.neohapsis.com/archives/bugtraq/2000-10/0017.html |
| Recommendation |
Disable the finger service immediately, or upgrade your finger daemon not to be vulnerable.
To disable the finger daemon started from inetd: 1. Edit the /etc/inetd.conf (or equivalent) file. 2. Locate the line that controls the daemon. 3. Type a # at the beginning of the line to comment out the daemon. 4. Restart inetd.
*Solaris 10, Solaris 11: # svcadm disable svc:/network/finger:default
*Enterprise Linux 6.4, CentOS 6.4, Fedora 19: Open /etc/xinetd.d/finger and set disable=yes and then restart xinetd
For more information on GNU finger, see: ftp://prep.ai.mit.edu/pub/gnu/finger-1.37.tar.gz. |
| Related URL |
CVE-2000-0915 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|