Lucene search

K
openvasThis script is Copyright (C) 2002 Andrew HintzOPENVAS:11193
HistoryNov 03, 2005 - 12:00 a.m.

akfingerd

2005-11-0300:00:00
This script is Copyright (C) 2002 Andrew Hintz
plugins.openvas.org
8

EPSS

0.013

Percentile

86.0%

The remote finger service appears to vulnerable to a remote
attack which can disrupt the service of the finger daemon.
This denial of service does not effect other services that
may be running on the remote computer, only the finger
service can be disrupted.

akfingerd version 0.5 or earlier is running on the remote
host. This daemon has a history of security problems,
make sure that you are running the latest version of
akfingerd.

Versions 0.5 and earlier of akfingerd are vulnerable to a
remote denial of service attack. They are also vulnerable
to several local attacks.

# OpenVAS Vulnerability Test
# $Id: finger_akfingerd.nasl 8023 2017-12-07 08:36:26Z teissa $
# Description: akfingerd
#
# Authors:
# Andrew Hintz <http://guh.nu>
# (It is based on Renaud's template.)
#
# Copyright:
# Copyright (C) 2002 Andrew Hintz
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#

tag_summary = "The remote finger service appears to vulnerable to a remote
attack which can disrupt the service of the finger daemon.
This denial of service does not effect other services that
may be running on the remote computer, only the finger
service can be disrupted.

akfingerd version 0.5 or earlier is running on the remote
host.  This daemon has a history of security problems, 
make sure that you are running the latest version of 
akfingerd.

Versions 0.5 and earlier of akfingerd are vulnerable to a
remote denial of service attack.  They are also vulnerable
to several local attacks.";

if(description)
{
 script_id(11193);
 script_version("$Revision: 8023 $");
 script_tag(name:"last_modification", value:"$Date: 2017-12-07 09:36:26 +0100 (Thu, 07 Dec 2017) $");
 script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
 script_tag(name:"cvss_base", value:"5.0");
 script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:N/A:P");
 script_cve_id("CVE-2002-2243");
 script_bugtraq_id(6323);

 name = "akfingerd";
 script_name(name);

 
 script_category(ACT_GATHER_INFO);
  script_tag(name:"qod_type", value:"remote_analysis"); #This script should not disrupt the machine at all
 
 
 script_copyright("This script is Copyright (C) 2002 Andrew Hintz");
 family = "Finger abuses";
 script_family(family);
 script_dependencies("find_service.nasl");
 script_require_ports("Services/finger", 79);
 script_tag(name : "summary" , value : tag_summary);
 exit(0);
}

#
# The script code starts here
#

port = get_kb_item("Services/finger");
if(!port)port = 79;
if(get_port_state(port))
{
 soc = open_sock_tcp(port);
 if(soc)
 {
  buf = string("[email protected]@127.0.0.1\r\n"); #send request for forwarded finger query
  send(socket:soc, data:buf);
  data = recv(socket:soc, length:96);
  close(soc);
  if("Forwarding is not supported." >< data) #check for forwarding-denial message used by akfingerd
  {
   soc1 = open_sock_tcp(port); #start a connection and leave it open
   if(soc1)
   {
    soc2 = open_sock_tcp(port); #start another connection and issue a request on it
    if(soc2)
    {
     send(socket:soc2, data:buf);
     data2 = recv(socket:soc2, length:96);
     if(!data2) security_message(port);  #akfingerd won't send a reply on second connection while the first is still open
     close(soc2);
    }
    else security_message(port);
    close(soc1);
   }
  }
 }
}

EPSS

0.013

Percentile

86.0%

Related for OPENVAS:11193