|
Family: Finger abuses --> Category: destructive_attack
fingerd buffer overflow Vulnerability Scan
Vulnerability Scan Summary Sends a long command to fingerd
Detailed Explanation for this Vulnerability Test
Nessus was able to crash the remote finger daemon by sending a too long
request.
This flaw is probably a buffer overflow and might be exploitable
to run arbitrary code on this machine.
Solution : Disable your finger daemon, apply the latest patches from your
vendor, or a safer software.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|