|
Family: Finger abuses --> Category: infos
Finger redirection check Vulnerability Scan
Vulnerability Scan Summary Finger user@host1@host2
Detailed Explanation for this Vulnerability Test
The remote finger service accepts to redirect requests. That is, users can
perform requests like :
finger user@host@victim
This allows a possible hacker to use this computer as a relay to gather information
on a third party network.
Solution: Disable the remote finger daemon (comment out the 'finger' line
in /etc/inetd.conf and restart the inetd process) or upgrade it to a more
secure one.
Threat Level: Low
Click HERE for more information and discussions on this network vulnerability scan.
|