cfingerd < 1.4.4 Multiple Vulnerabilities

This script is Copyright (C) 2001-2016 Tenable Network Security, Inc.


Synopsis :

The remote finger service has multiple vulnerabilities.

Description :

The version of cfingerd running on the remote host has multiple
vulnerabilities, including :

- A local buffer overflow in the GECOS field, which can be used to
escalate privileges.
- A format string vulnerability, triggered by a malformed ident
reply. This can be used to execute arbitrary code.
- A local privilege escalation issue.

See also :

http://seclists.org/bugtraq/1999/Sep/326
http://www.nessus.org/u?f2f0892c

Solution :

Upgrade to cfingerd version 1.4.4 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 10652 (cfinger_format_bug.nasl)

Bugtraq ID: 2576
651

CVE ID: CVE-1999-0243
CVE-1999-0708
CVE-2001-0609

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now