Debian Security Advisory DSA 048-1 (cfingerd) - Logging code vulnerabilit
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Debian DSA-048-3 : samba | 29 Sep 200400:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : samba (MDKSA-2001:040-1) | 31 Jul 200400:00 | – | nessus |
![]() | Samba creates temporary files insecurely | 17 Sep 200100:00 | – | cert |
![]() | CVE-2001-0406 | 24 May 200104:00 | – | cvelist |
![]() | CVE-2001-0406 | 2 Jul 200104:00 | – | cve |
![]() | Debian Security Advisory DSA 048-1 (cfingerd) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2001-0406 | 2 Jul 200104:00 | – | nvd |
Source | Link |
---|---|
secure1 | www.secure1.securityspace.com/smysecure/catid.html |
# SPDX-FileCopyrightText: 2008 E-Soft Inc.
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.53865");
script_cve_id("CVE-2001-0406");
script_version("2023-07-19T05:05:15+0000");
script_tag(name:"last_modification", value:"2023-07-19 05:05:15 +0000 (Wed, 19 Jul 2023)");
script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
script_tag(name:"cvss_base", value:"2.1");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:N/I:P/A:N");
script_name("Debian Security Advisory DSA 048-1 (cfingerd)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2008 E-Soft Inc.");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages", re:"ssh/login/release=DEB2\.2");
script_xref(name:"URL", value:"https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20048-1");
script_tag(name:"insight", value:"Megyer Laszlo report on Bugtraq that the cfingerd Debian as distributed
with Debian GNU/Linux 2.2 was not careful in its logging code. By
combining this with an off-by-one error in the code that copied the
username from an ident response cfingerd could exploited by a remote
user. Since cfingerd does not drop its root privileges until after
it has determined which user to finger an attacker can gain
root privileges.
This has been fixed in version 1.4.1-1.1, and we recommend that you
upgrade your cfingerd package immediately.");
script_tag(name:"summary", value:"The remote host is missing an update to cfingerd
announced via advisory DSA 048-1.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-deb.inc");
res = "";
report = "";
if((res = isdpkgvuln(pkg:"cfingerd", ver:"1.4.1-1.1", rls:"DEB2.2")) != NULL) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo