|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Finger abuses >> Finger dot at host feature Vulnerability Assessment Details
|
Finger dot at host feature |
||
Finger .@host feature Detailed Explanation for this Vulnerability Assessment There is a bug in the remote finger service which, when triggered, permits a user to force the remote finger daemon to display the list of the accounts that have never been used, by issuing the request : finger .@target This list will help a possible hacker to guess the operating system type. It will also tell him which accounts have never been used, which will often make him focus his attacks on these accounts. Solution : disable the finger service in /etc/inetd.conf and restart the inetd process, or upgrade your finger service. Network Security Threat Level: Medium Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 1999 Renaud Deraison |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |