Skip to main content

CVE-1999-0259: cfingerd lists all users on a system via search.**@target.

Medium
VulnerabilityCVE-1999-0259cve-1999-0259
Published: Fri May 23 1997 (05/23/1997, 04:00:00 UTC)
Source: NVD
Vendor/Project: infodrom
Product: cfingerd

Description

cfingerd lists all users on a system via search.**@target.

AI-Powered Analysis

AILast updated: 07/01/2025, 23:56:20 UTC

Technical Analysis

CVE-1999-0259 is a medium-severity vulnerability affecting version 1.2.2 of the cfingerd service, a finger daemon implementation from the infodrom project. The vulnerability allows an unauthenticated remote attacker to enumerate all user accounts on a system by issuing a specially crafted search query to the cfingerd service. Specifically, the service responds to search queries by listing all users on the target system, thereby disclosing sensitive information about user accounts without requiring authentication or user interaction. The vulnerability is classified with a CVSS base score of 5.0 (medium), with the vector AV:N/AC:L/Au:N/C:P/I:N/A:N, indicating that it is remotely exploitable over the network with low attack complexity, requires no authentication, and impacts confidentiality by exposing user account information. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The vulnerability dates back to 1997 and affects legacy systems running cfingerd 1.2.2, which may still be present in some legacy or embedded environments. The exposure of user account information can facilitate further reconnaissance and targeted attacks such as password guessing, social engineering, or privilege escalation attempts.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of user account information, which compromises confidentiality. While it does not directly affect system integrity or availability, the leaked user list can aid attackers in crafting more effective attacks, including brute force or credential stuffing campaigns. Organizations in Europe that still operate legacy systems or network services exposing cfingerd 1.2.2 are at risk of information leakage that could lead to further compromise. This is especially relevant for sectors with legacy infrastructure such as industrial control systems, research institutions, or governmental agencies that may have older UNIX-based systems. The vulnerability could also be leveraged as part of a broader attack chain targeting European entities, increasing the risk profile for organizations with exposed finger services.

Mitigation Recommendations

Given that no patch is available for cfingerd 1.2.2, European organizations should take immediate steps to mitigate exposure. First, disable the cfingerd service entirely if it is not strictly required, as the finger protocol is largely obsolete and unnecessary in modern environments. If the service must remain active, restrict access to the service using firewall rules or network segmentation to limit queries to trusted internal hosts only. Additionally, consider deploying intrusion detection/prevention systems to monitor and block suspicious finger queries indicative of reconnaissance attempts. Organizations should also conduct audits to identify legacy systems running cfingerd and plan for their upgrade or decommissioning. Implementing strong password policies and multi-factor authentication can reduce the risk of further compromise even if user enumeration occurs. Finally, raising awareness among system administrators about the risks of legacy services and encouraging regular vulnerability assessments will help prevent exploitation.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de6d2

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/1/2025, 11:56:20 PM

Last updated: 8/13/2025, 11:55:19 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats