Vulnerability   
Search   
    Search 191973 CVE descriptions
and 86218 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.702635
Category:Debian Local Security Checks
Title:Debian Security Advisory DSA 2635-1 (cfingerd - buffer overflow)
Summary:Malcolm Scott discovered a remote-exploitable buffer overflow in the;RFC1413 (ident) client of cfingerd, a configurable finger daemon. This;vulnerability was introduced in a previously applied patch to the;cfingerd package in 1.4.3-3.
Description:Summary:
Malcolm Scott discovered a remote-exploitable buffer overflow in the
RFC1413 (ident) client of cfingerd, a configurable finger daemon. This
vulnerability was introduced in a previously applied patch to the
cfingerd package in 1.4.3-3.

Affected Software/OS:
cfingerd on Debian Linux

Solution:
For the stable distribution (squeeze), this problem has been fixed in
version 1.4.3-3+squeeze1.

For the testing distribution (wheezy), this problem has been fixed in
version 1.4.3-3.1.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.3-3.1.

We recommend that you upgrade your cfingerd packages.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-1049
Debian Security Information: DSA-2635 (Google Search)
http://www.debian.org/security/2013/dsa-2635
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=700098
https://bugs.launchpad.net/ubuntu/+source/cfingerd/+bug/1104425
http://osvdb.org/90747
CopyrightCopyright (C) 2013 Greenbone Networks GmbH http://greenbone.net

This is only one of 86218 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2020 E-Soft Inc. All rights reserved.