cfingerd Wildcard Argument Information Disclosure

This script is Copyright (C) 1999-2016 Tenable Network Security, Inc.


Synopsis :

The remote finger server has an information disclosure vulnerability.

Description :

The remote host is running 'cfingerd', a finger daemon.

There is a bug in the remote cfinger daemon that allows a remote
attacker to get the lists of the users of this system when issuing
the command :

finger search.**@victim

This information can be used by a remote attacker to mount further
attacks.

See also :

http://seclists.org/bugtraq/1997/May/160
http://seclists.org/bugtraq/1997/May/171

Solution :

There is no known solution at this time. Use another finger daemon,
or disable this service in inetd.conf.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: Misc.

Nessus Plugin ID: 10038 (cfinger_search.nasl)

Bugtraq ID:

CVE ID: CVE-1999-0259

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now