| VID |
15010 |
| Severity |
30 |
| Port |
79 |
| Protocol |
TCP |
| Class |
FINGER |
| Detailed Description |
The akfingerd daemon is vulnerable to a remote denial of service attack. akfingerd daemon is a freely implementation of a small and secure finger daemon, available replacement for the finger service, written by Andreas Krennmair. It's only implemented the "must" features of RFC 1288 and runs stand-alone, without a inetd, tcpd or something. A bug has been discovered in akfingerd that allows a remote attacker to cause a denial of service. Because akfingerd allows only one to connect for the duration of one connection, if a remote attacker connects to the daemon via finger, it is possible to deny access to other legitimate users. This denial of service does not effect other services that may be running on the remote computer, only the finger service itself can be disrupted.
See the akfingerd web page for the more information : http://www.synflood.at/akfingerd/
* Platforms Affected: akfingerd versions 0.5 and earlier |
| Recommendation |
No remedy available as of January 2003.
As a workaround, disable the service if the finger service isn't required on this system.
*Solaris 10, Solaris 11: # svcadm disable svc:/network/finger:default
*Enterprise Linux 6.4, CentOS 6.4, Fedora 19: Open /etc/xinetd.d/finger and set disable=yes and then restart xinetd
Or Replace with a alternative that doesn't affected by this vulnerability. |
| Related URL |
CVE-2002-2243 (CVE) |
| Related URL |
6323 (SecurityFocus) |
| Related URL |
10794 (ISS) |
|