Skip to main content

CVE-1999-0150: The Perl fingerd program allows arbitrary command execution from remote users.

High
VulnerabilityCVE-1999-0150cve-1999-0150
Published: Tue Jul 01 1997 (07/01/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: fingerd

Description

The Perl fingerd program allows arbitrary command execution from remote users.

AI-Powered Analysis

AILast updated: 07/01/2025, 06:27:53 UTC

Technical Analysis

CVE-1999-0150 is a high-severity vulnerability affecting the Perl implementation of the fingerd program, a network service that responds to finger protocol requests. This vulnerability allows remote attackers to execute arbitrary commands on the affected system without authentication. The flaw arises because the Perl fingerd program improperly handles user input, enabling command injection through crafted finger requests. Since the service listens on a network port and processes input from remote users, an attacker can exploit this vulnerability over the network without any user interaction or credentials. Successful exploitation compromises the confidentiality, integrity, and availability of the target system by allowing arbitrary code execution, potentially leading to full system compromise. Although this vulnerability was published in 1997 and no patches are available, it remains relevant for legacy systems still running the vulnerable Perl fingerd service. The CVSS v2 score of 7.5 reflects the high impact and ease of exploitation, with network attack vector, no authentication required, and complete compromise of system security properties.

Potential Impact

For European organizations, the exploitation of CVE-1999-0150 could lead to severe consequences including unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within corporate networks. Organizations relying on legacy Unix or Linux systems that still run the Perl fingerd service are at risk. The arbitrary command execution capability could allow attackers to install malware, exfiltrate data, or disrupt operations. Given the vulnerability's age, it is unlikely to be present in modern environments, but industrial control systems, research institutions, or government agencies with legacy infrastructure might still be exposed. The impact is exacerbated in sectors with stringent data protection requirements under GDPR, as breaches could lead to regulatory penalties and reputational damage. Additionally, the lack of available patches means organizations must rely on mitigation and network controls to reduce risk.

Mitigation Recommendations

Since no official patches exist for this vulnerability, European organizations should take the following specific actions: 1) Identify and inventory all systems running the Perl fingerd service using network scanning and configuration management tools. 2) Disable or uninstall the fingerd service on all systems, especially those exposed to untrusted networks. 3) If the service is required for legacy reasons, isolate affected systems within segmented network zones with strict firewall rules limiting access to trusted hosts only. 4) Employ intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious finger protocol traffic. 5) Regularly audit network services and remove any unnecessary legacy services to reduce attack surface. 6) Implement strict access controls and monitor logs for unusual finger protocol activity. 7) Educate system administrators about the risks of legacy services and encourage migration to supported, secure alternatives.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de721

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 6:27:53 AM

Last updated: 8/6/2025, 2:43:14 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats