First published: Mon Dec 31 2001(Updated: )
The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.5 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Sun SunOS | =5.8 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.8 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =7.0 | |
Sun SunOS | =5.6 | |
Sun SunOS | =5.5.1 | |
Sun SunOS | =5.6 | |
Oracle Solaris SPARC | =2.6 | |
Oracle Solaris SPARC | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1503 is classified as a moderate severity vulnerability.
CVE-2001-1503 allows remote attackers to enumerate user accounts on affected systems via the finger service.
To fix CVE-2001-1503, it is recommended to disable the finger daemon, in.fingerd, on the affected Solaris systems.
CVE-2001-1503 affects Sun Solaris versions 2.5 through 8 and SunOS versions 5.5 through 5.8.
The attack vector for CVE-2001-1503 is remote access through the finger protocol.