CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files. | 7.2 |
|||
The Perl fingerd program allows arbitrary command execution from remote users. | 7.5 |
|||
A version of finger is running that exposes valid user information to any entity on the network. |