FreeBSD 4.1.1 Finger Arbitrary Remote File Access

This script is Copyright (C) 2000-2011 Tenable Network Security, Inc.

Synopsis :

The finger service running on the remote host has an arbitrary
file access vulnerability.

Description :

The finger daemon running on the remote host will reveal the contents
of arbitrary files when given a command similar to the following :

finger /etc/passwd@target

Which will return the contents of /etc/passwd.

Solution :

Upgrade to the latest version of this finger daemon.

Risk factor :

High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.4

Family: Misc.

Nessus Plugin ID: 10534 (finger_freebsd.nasl)

Bugtraq ID: 1803

CVE ID: CVE-2000-0915

Ready to Scan Unlimited IPs & Run Compliance Checks?

Upgrade to Nessus Professional today!

Buy Now

Combine the Power of Nessus with the Ease of Cloud

Start your free Nessus Cloud trial now!

Begin Free Trial