This script is Copyright (C) 2005-2011 Tenable Network Security, Inc.
The finger service running on the remote host has a remote buffer
Nessus was able to crash the remote finger daemon by sending a very
long request. This is likely due to a buffer overflow. A remote
attacker could potentially exploit this to execute arbitrary code.
See also :
Upgrade to the latest version of this finger daemon.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 9.5
Public Exploit Available : true
Nessus Plugin ID: 17141 (finger_overflow.nasl)
Bugtraq ID: 2