|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 2635-1 (cfingerd - buffer overflow)|
|Summary:||Malcolm Scott discovered a remote-exploitable buffer overflow in the;RFC1413 (ident) client of cfingerd, a configurable finger daemon. This;vulnerability was introduced in a previously applied patch to the;cfingerd package in 1.4.3-3.|
Malcolm Scott discovered a remote-exploitable buffer overflow in the
RFC1413 (ident) client of cfingerd, a configurable finger daemon. This
vulnerability was introduced in a previously applied patch to the
cfingerd package in 1.4.3-3.
cfingerd on Debian Linux
For the stable distribution (squeeze), this problem has been fixed in
For the testing distribution (wheezy), this problem has been fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you upgrade your cfingerd packages.
Common Vulnerability Exposure (CVE) ID: CVE-2013-1049|
Debian Security Information: DSA-2635 (Google Search)
|Copyright||Copyright (C) 2013 Greenbone Networks GmbH http://greenbone.net|
|This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.