[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] another cfingerd remote exploit



Topic
=====
remote root exploit in cfingerd (another one)

Problem Description
===================
There exist at least three remote root exploits for this vulnerability
that have been published - needless to say, if you are affected you must
fix this immediately or - better - uninstall the cfingerd package.

cfingerd (a configurable finger daemon) suffers from two problems:

1. The code that reads configuration files (files in which $ commands are
   expanded) copies its input to a buffer without checking for a buffer
   overflow. When the ALLOW_LINE_PARSING feature is enabled that code
   is used for reading users files as well.

2. There also is a printf call in the same routine that does not protect
   against printf format attacks.

ALLOW_LINE_PARSING is enabled in the default /etc/cfingerd.conf configuration
file. The vulnerabilities can be exploited by local and remote users to
gain root access.

Affected Systems
================
Systems that use cfingerd with versions <= 1.4.3 (i.e., all versions),
e.g., Debian

Workaround (recommended!)
=========================
Uninstall the cfingerd package!
Do not run cfingerd or any finger daemon for that matter.
Comment out the corresponding line in /etc/inetd.conf and
"kill -HUP <pid of inetd>"

Solution
========
(in case you really need cfingerd)

Debian 2.2 (potato)
-------------------
update to cfingerd_1.4.1-1.2_i386.deb