CVE-1999-0106: Finger redirection allows finger bombs.
Finger redirection allows finger bombs.
AI Analysis
Technical Summary
CVE-1999-0106 is a vulnerability related to the finger protocol, specifically involving finger redirection that allows what is termed as 'finger bombs.' The finger protocol is an old network protocol used to retrieve information about users on a remote system. The vulnerability arises when the finger service allows redirection of finger requests, which can be exploited to cause denial of service (DoS) conditions by overwhelming the target system with excessive or malformed finger requests, effectively creating a 'finger bomb.' This does not compromise confidentiality or integrity but impacts availability by potentially crashing or severely degrading the finger service or the host system. The vulnerability requires local access (AV:L - Attack Vector: Local) and no authentication (Au:N), with low attack complexity (AC:L). The CVSS score is 2.1, indicating a low severity primarily due to the limited impact and the requirement for local access. There are no known patches or exploits in the wild, and the affected versions are unspecified, reflecting the age and obsolescence of the finger protocol in modern environments.
Potential Impact
For European organizations, the impact of this vulnerability is minimal in modern contexts because the finger protocol is largely deprecated and rarely enabled on contemporary systems. However, legacy systems or specialized environments that still run finger services could be susceptible to denial of service attacks that disrupt user information services or potentially affect system stability. This could lead to minor operational disruptions, particularly in organizations with legacy infrastructure or in academic and research institutions where finger might still be in use. The vulnerability does not expose sensitive data or allow unauthorized access, so the risk to confidentiality and integrity is negligible. Availability impact is limited to the finger service or the host system's stability under attack conditions.
Mitigation Recommendations
Given the obsolescence of the finger protocol, the primary mitigation is to disable the finger service entirely on all systems, especially those connected to networks. For environments where finger must remain enabled, implement strict access controls to limit finger service usage to trusted local users only. Network-level filtering can be applied to block finger protocol traffic (typically TCP port 79) from untrusted sources. Monitoring and logging finger service usage can help detect unusual activity indicative of attempted finger bomb attacks. Since no patches are available, these configuration and network controls are the most effective mitigations. Additionally, organizations should review and update legacy systems to modern protocols and services to reduce exposure to such outdated vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-1999-0106: Finger redirection allows finger bombs.
Description
Finger redirection allows finger bombs.
AI-Powered Analysis
Technical Analysis
CVE-1999-0106 is a vulnerability related to the finger protocol, specifically involving finger redirection that allows what is termed as 'finger bombs.' The finger protocol is an old network protocol used to retrieve information about users on a remote system. The vulnerability arises when the finger service allows redirection of finger requests, which can be exploited to cause denial of service (DoS) conditions by overwhelming the target system with excessive or malformed finger requests, effectively creating a 'finger bomb.' This does not compromise confidentiality or integrity but impacts availability by potentially crashing or severely degrading the finger service or the host system. The vulnerability requires local access (AV:L - Attack Vector: Local) and no authentication (Au:N), with low attack complexity (AC:L). The CVSS score is 2.1, indicating a low severity primarily due to the limited impact and the requirement for local access. There are no known patches or exploits in the wild, and the affected versions are unspecified, reflecting the age and obsolescence of the finger protocol in modern environments.
Potential Impact
For European organizations, the impact of this vulnerability is minimal in modern contexts because the finger protocol is largely deprecated and rarely enabled on contemporary systems. However, legacy systems or specialized environments that still run finger services could be susceptible to denial of service attacks that disrupt user information services or potentially affect system stability. This could lead to minor operational disruptions, particularly in organizations with legacy infrastructure or in academic and research institutions where finger might still be in use. The vulnerability does not expose sensitive data or allow unauthorized access, so the risk to confidentiality and integrity is negligible. Availability impact is limited to the finger service or the host system's stability under attack conditions.
Mitigation Recommendations
Given the obsolescence of the finger protocol, the primary mitigation is to disable the finger service entirely on all systems, especially those connected to networks. For environments where finger must remain enabled, implement strict access controls to limit finger service usage to trusted local users only. Network-level filtering can be applied to block finger protocol traffic (typically TCP port 79) from untrusted sources. Monitoring and logging finger service usage can help detect unusual activity indicative of attempted finger bomb attacks. Since no patches are available, these configuration and network controls are the most effective mitigations. Additionally, organizations should review and update legacy systems to modern protocols and services to reduce exposure to such outdated vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Threat ID: 682ca32ab6fd31d6ed7de663
Added to database: 5/20/2025, 3:43:38 PM
Last enriched: 7/2/2025, 12:10:57 AM
Last updated: 7/31/2025, 3:44:44 PM
Views: 11
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9020: Use After Free in PX4 PX4-Autopilot
LowCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.