Korean
<< Back
VID 15011
Severity 30
Port 79
Protocol TCP
Class FINGER
Detailed Description The host seems to be running fkey, which is vulnerable to an arbitrary file disclosure vulnerability. fkey is a scalable finger daemon server that is used for public display of user-specified files, e.g. PGP keys, contact information, etc. fkey versions 0.0.2 and earlier could allow a remote attacker to read arbitrary files by supplying a file name shorter than 10 characters. This vulnerability could allow an attacker to disclose sensitive files on a computer, which might aid in various attacks.

* References:
http://www.securiteam.com/exploits/5PP0L0UELA.html
http://securityfocus.com/archive/1/387792
http://freshmeat.net/projects/fkey

* Platforms Affected:
Freshmeat.net, fkey versions 0.0.2 and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of March 2005.

Disable the affected finger service.

*Solaris 10, Solaris 11:
# svcadm disable svc:/network/finger:default

*Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/finger and set disable=yes
and then restart xinetd
Related URL (CVE)
Related URL 12321 (SecurityFocus)
Related URL 19026 (ISS)