CVE-2001-1503
Published Dec 31, 2001
Last updated 6 years ago
Overview
- Description
- The finger daemon (in.fingerd) in Sun Solaris 2.5 through 8 and SunOS 5.5 through 5.8 allows remote attackers to list all accounts on a host by typing finger 'a b c d e f g h'@host.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201" }, { "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B" }, { "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B" }, { "criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2" }, { "criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB" }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C89DF53-2038-487A-A08F-8D705B7BFB27" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A" }, { "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B" }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9" }, { "criteria": "cpe:2.3:o:sun:sunos:5.6:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E938921-A452-4333-B587-31A1A5999747" }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759" }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4A01E03-2ACC-471E-B778-89EF01B23B92" }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224" }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:x86:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC05D524-BAEF-450D-B904-C11C9DF1192D" } ], "operator": "OR" } ] } ]