Vulnerability Name: | CCN-641 | ||||||
Published: | 1988-11-01 | ||||||
Updated: | 1988-11-01 | ||||||
Summary: | Finger is vulnerable to a buffer overflow. A remote attacker could exploit this vulnerability to execute arbitrary code on the system with root privileges. This vulnerability is named for Robert T. Morris (RTM), author of the Internet Worm that originally popularized this vulnerability. | ||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C) 7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: COAST Security FTP Archive Morris Worm article archive Source: CCN Type: Bill Maloy's Web site Morris Worm Source: CCN Type: BID-2 BSD fingerd buffer overflow Vulnerability Source: XF Type: UNKNOWN finger-rtm(641) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |