Family: Finger abuses --> Category: infos
Solaris finger disclosure Vulnerability Scan
Vulnerability Scan Summary
Enumerates users with finger
Detailed Explanation for this Vulnerability Test
There is a bug in the remote finger service which, when triggered, allows
a user to force the remote finger daemon to display the list of the accounts
that have never been used, by issuing the request :
finger 'a b c d e f g h'@target
This list will help a possible hacker to guess the operating system type. It will
also tell him which accounts have never been used, which will often make him
focus his attacks on these accounts.
Solution : disable the finger service in /etc/inetd.conf and restart the inetd
process, or apply the relevant patches from Sun Microsystems.
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.