Skip to main content

CVE-1999-0612: A version of finger is running that exposes valid user information to any entity on the network.

Low
VulnerabilityCVE-1999-0612cve-1999-0612
Published: Sat Mar 01 1997 (03/01/1997, 05:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: finger_service

Description

A version of finger is running that exposes valid user information to any entity on the network.

AI-Powered Analysis

AILast updated: 07/02/2025, 00:10:44 UTC

Technical Analysis

CVE-1999-0612 is a vulnerability associated with the finger service, a network utility that was historically used to retrieve information about users on a remote system. The vulnerability arises from a version of the finger service that exposes valid user information to any entity on the network without requiring authentication. This means that an attacker can query the finger service remotely and obtain details such as usernames, login status, and potentially other user-related information. The finger protocol operates over TCP port 79 and was commonly used in earlier UNIX and GNU systems. The exposure of user information can aid attackers in reconnaissance activities, facilitating further attacks such as password guessing, social engineering, or targeted exploitation. The vulnerability does not impact confidentiality, integrity, or availability directly beyond information disclosure, and no authentication or user interaction is required to exploit it. The vulnerability is dated from 1997, and no patches or fixes are available, likely due to the finger service being deprecated or disabled by default in modern systems. The CVSS vector indicates network attack vector, low complexity, no authentication, and no impact on confidentiality, integrity, or availability, which aligns with the low severity classification. No known exploits are reported in the wild, and the affected versions are unspecified, suggesting this is a general advisory for any running finger service version with this behavior.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of valid user account information. While this does not directly compromise system integrity or availability, it can facilitate targeted attacks by providing attackers with a list of valid usernames, which can be used in brute-force attacks, phishing campaigns, or social engineering. Organizations with legacy systems or those that have not disabled the finger service may be at risk. The exposure of user information could be particularly sensitive in regulated industries such as finance, healthcare, or government, where user privacy and data protection are critical. However, given the age of the vulnerability and the general deprecation of the finger service, the practical risk is low for most modern European organizations. Nonetheless, any exposure of internal user information to external entities can be considered a security weakness that should be addressed to maintain a strong security posture.

Mitigation Recommendations

European organizations should verify whether the finger service is running on any of their networked systems, especially legacy UNIX or GNU-based servers. If the service is found to be active, it should be disabled or blocked at network boundaries using firewalls or access control lists to prevent external access. Since no patches are available, the primary mitigation is to remove or restrict the service. Network monitoring should be employed to detect any attempts to query the finger service. Additionally, organizations should conduct regular audits of running services and ensure that deprecated or unnecessary services are disabled. For environments where the finger service is required for legacy reasons, consider isolating these systems within segmented network zones with strict access controls. Employee awareness training should also emphasize the risks of information disclosure and encourage reporting of suspicious network activity.

Need more detailed analysis?Get Pro

Threat ID: 682ca32ab6fd31d6ed7de669

Added to database: 5/20/2025, 3:43:38 PM

Last enriched: 7/2/2025, 12:10:44 AM

Last updated: 8/17/2025, 10:07:46 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats