7.2
CVSSv2

CVE-2001-0735

Published: 18/10/2001 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 735
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Buffer overflow in cfingerd 1.4.3 and previous versions with the ALLOW_LINE_PARSING option enabled allows local users to execute arbitrary code via a long line in the .nofinger file.

Vulnerable Product Search on Vulmon Subscribe to Product

infodrom cfingerd 1.4.3

infodrom cfingerd 1.4.1

infodrom cfingerd 1.4.2

Vendor Advisories

Steven van Acker reported on bugtraq that the version of cfingerd (a configurable finger daemon) as distributed in Debian GNU/Linux 22 suffers from two problems: The code that reads configuration files (files in which $ commands are expanded) copied its input to a buffer without checking for a buffer overflow When the ALLOW_LINE_PARSING fe ...

Exploits

source: wwwsecurityfocuscom/bid/2914/info cfingerd is a secure implementation of the finger daemon cfingerd has been contributed to by many authors, and is maintained by the cfingerd development team A buffer overflow in cfingerd makes it possible for a local user to gain elevated privileges Due to insufficient validation of input ...
source: wwwsecurityfocuscom/bid/2914/info cfingerd is a secure implementation of the finger daemon cfingerd has been contributed to by many authors, and is maintained by the cfingerd development team A buffer overflow in cfingerd makes it possible for a local user to gain elevated privileges Due to insufficient validation of input, ...
source: wwwsecurityfocuscom/bid/2914/info cfingerd is a secure implementation of the finger daemon cfingerd has been contributed to by many authors, and is maintained by the cfingerd development team A buffer overflow in cfingerd makes it possible for a local user to gain elevated privileges Due to insufficient validation of input, a ...