Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA066] DSA-066-1 cfingerd


Vulnerability Assessment Details

[DSA066] DSA-066-1 cfingerd

Vulnerability Assessment Summary
DSA-066-1 cfingerd

Detailed Explanation for this Vulnerability Assessment

Steven van Acker reported on bugtraq that the version of cfingerd (a
configurable finger daemon) as distributed in Debian GNU/Linux 2.2
suffers from two problems:


The code that reads configuration files (files in which $ commands are
expanded) copied its input to a buffer without checking for a buffer
overflow. When the ALLOW_LINE_PARSING feature is enabled that code
is used for reading users' files as well, so local users could exploit
this.

There also was a printf call in the same routine that did not protect
against printf format attacks.


Since ALLOW_LINE_PARSING is enabled in the default /etc/cfingerd.conf
local users could use this to gain root access.

This has been fixed in version 1.4.1-1.2, and we recommend that you upgrade
your cfingerd package immediately.



Solution : http://www.debian.org/security/2001/dsa-066
Network Security Threat Level: High

Networks Security ID: 2914, 2915

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors


Supermicro 4U 4x Nvidia GPU AI Server 3.8Ghz 8-Core 256GB 2x10G SFP+ 2x2200W picture

Supermicro 4U 4x Nvidia GPU AI Server 3.8Ghz 8-Core 256GB 2x10G SFP+ 2x2200W

$3472.00



Supermicro 4U 4x Nvidia GPU AI Server 3.8Ghz 8-Core 64GB 2x10G SFP+ 2x2200W picture

Supermicro 4U 4x Nvidia GPU AI Server 3.8Ghz 8-Core 64GB 2x10G SFP+ 2x2200W

$3180.00



Intel - Core i9-13900K 13th Gen 24 cores 8 P-cores + 16 E-cores 36M Cache, 3 ... picture

Intel - Core i9-13900K 13th Gen 24 cores 8 P-cores + 16 E-cores 36M Cache, 3 ...

$689.99



Intel - Core i7-13700K 13th Gen 16 cores 8 P-cores + 8 E-cores 30M Cache, 3.4... picture

Intel - Core i7-13700K 13th Gen 16 cores 8 P-cores + 8 E-cores 30M Cache, 3.4...

$489.99



Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc... picture

Intel - Core i7-12700K Desktop Processor 12 (8P+4E) Cores up to 5.0 GHz Unloc...

$419.99



Apple Mac Pro Processor Tray 5,1 2010 2012 2.4ghz 8 core picture

Apple Mac Pro Processor Tray 5,1 2010 2012 2.4ghz 8 core

$79.99



i9 9900k  8-Core 16GB RAM - 1TB SSD - 2 TB HDD - NVIDIA  RTX 4060ti - Gaming PC picture

i9 9900k 8-Core 16GB RAM - 1TB SSD - 2 TB HDD - NVIDIA RTX 4060ti - Gaming PC

$1799.99



Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc... picture

Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...

$619.99



HP EliteDesk 800 G4 Micro Intel Core i5-8500T 2.1GHz 8GB RAM 256GB SSD W11P WIFI picture

HP EliteDesk 800 G4 Micro Intel Core i5-8500T 2.1GHz 8GB RAM 256GB SSD W11P WIFI

$120.00



HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA picture

HP Workstation Z640 2x Xeon E5-2623V4 32GB Ram Dual 256GB SSD K420 Linux GA

$234.98



Discussions

No Discussions have been posted on this vulnerability.