[3038] in WWW Security List Archive

home help back first fref pref prev next nref lref last post

Re[2]: SUMMARY: Finger& Security Problems

daemon@ATHENA.MIT.EDU (Mark_W_Loveless@smtp.bnr.com)
Mon Sep 23 15:48:16 1996

From: Mark_W_Loveless@smtp.bnr.com
Date: Mon, 23 Sep 96 11:50:22 CST
To: www-security@ns2.rutgers.edu
Errors-To: owner-www-security@ns2.rutgers.edu

     Although most if not all modern fingerd's are not vulnerable to the 
     infamous worm hole, the fact is that finger allows a user who is not 
     on your system to see info (depending on configuration of your system) 
     like a user's full name, last time logged in, the shell used, if they 
     have mail, where they last logged in from, possibly phone number and 
     anything else the user (or admin) put in gecos. If you have no problem 
     with an outsider knowing this, then running fingerd is no problem. 
     Just be aware that idle accounts (especially one that has never been 
     logged into with a shell) might be a temptation to some individuals to 
     access your system.
     
     If on your local network you wish to allow fingering but not from the 
     outside, consider using tcp_wrapper and limiting access to fingerd to 
     YOUR network only.
     
     A bit off-topic, but....
     
     Mark_W_Loveless@smtp.bnr.com
     Opinions my own, not my employer


______________________________ Reply Separator _________________________________
Subject: Re: SUMMARY: Finger& Security Problems 
Author:  Chris Garrigues <cwg@DeepEddy.Com> at internet
Date:    9/21/96 7:13 AM


--===_-1_Fri_Sep_20_15:04:09_CDT_1996 
Content-Type: text/plain; charset=us-ascii
     
>    My original question was if there were any security concerns with 
> allowing users to finger your system.  The result of the answers I 
> acquired was no.  The fingering may give more information then you want 
> them to have however, you can easily limit the amount of information 
> that the people get.
     
I'm surprised you didn't get any cautionary messages to make sure that you're 
running a reasonably modern version of the finger daemon on your system.
     
finger was one of the paths that the internet worm used to infiltrate Unix 
systems.  This was due to a missing bounds check in libc that allowed the 
input to overrun into the executable code and thereby modify it on the fly.
     
A fine example of how even the most innocent seeming protocol can be a problem 
if the implementation is buggy.
     
Chris
     
-- 
Chris Garrigues                    O-              cwg@DeepEddy.Com
  Deep Eddy Internet Consulting                     +1 512 432 4046 
  609 Deep Eddy Avenue
  Austin, TX  78703-4513              http://www.DeepEddy.Com/~cwg/
     
     
     
--===_-1_Fri_Sep_20_15:04:09_CDT_1996 
Content-Type: application/pgp-signature
     
-----BEGIN PGP MESSAGE-----
Version: 2.6.2
     
iQB1AwUBMkL4tJaQnaaFII2dAQHyegMAvBHUjeoDh2vE2/5IiCE7/LfxyeTC2S+d 
orEPAGbtUzRRHfnMKGigMKTm74kP2HbyHZoOnn0y3qc0RKJZTAObxa6ZTYcMA0l8 
V3BUNQP4qcguvUPT8iYstFhMjJWJEnX3
=8dm2
-----END PGP MESSAGE-----
     
--===_-1_Fri_Sep_20_15:04:09_CDT_1996--


home help back first fref pref prev next nref lref last post