Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0813: Cfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program o

0
High
VulnerabilityCVE-1999-0813cve-1999-0813
Published: Tue Aug 10 1999 (08/10/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: infodrom
Product: cfingerd

Description

Cfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program on behalf of the user, allowing local users to gain root privileges.

AI-Powered Analysis

AILast updated: 06/27/2025, 18:39:32 UTC

Technical Analysis

CVE-1999-0813 is a high-severity local privilege escalation vulnerability found in the cfingerd daemon, a finger protocol server implementation from the infodrom project. The vulnerability arises when cfingerd is configured with the ALLOW_EXECUTION option enabled. Under this configuration, cfingerd executes programs on behalf of users but fails to properly drop its elevated privileges before doing so. As a result, a local attacker can exploit this flaw to execute arbitrary code with root privileges, effectively gaining full control over the affected system. The vulnerability was disclosed in 1999 and has a CVSS v2 base score of 7.2, reflecting its high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), requiring low attack complexity (AC:L) and no authentication (Au:N). Exploiting this vulnerability allows complete compromise of the system, including unauthorized access to sensitive data and the ability to disrupt or manipulate system operations. Although no patches are currently available, the vulnerability is well-documented and can be mitigated by disabling the ALLOW_EXECUTION option or removing cfingerd entirely, as the finger protocol is largely obsolete and rarely needed in modern environments.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if cfingerd is still in use on legacy systems or specialized environments. Successful exploitation results in local attackers gaining root privileges, which can lead to full system compromise, data breaches, and disruption of critical services. This is particularly concerning for organizations with sensitive or regulated data, such as financial institutions, healthcare providers, and government agencies. The vulnerability's local attack vector means that attackers must already have some form of access to the system, but once inside, they can escalate privileges and move laterally or persist undetected. Given the age of the vulnerability, it is unlikely to be exploited in modern, well-maintained environments; however, legacy systems or poorly maintained infrastructure in European organizations could still be at risk. The lack of available patches increases the risk for these environments, necessitating alternative mitigation strategies.

Mitigation Recommendations

1. Disable the ALLOW_EXECUTION option in cfingerd configuration to prevent execution of arbitrary programs with elevated privileges. 2. Remove or uninstall cfingerd entirely, as the finger protocol is obsolete and rarely necessary in modern networks. 3. Restrict local user access to systems running cfingerd to trusted personnel only, minimizing the risk of local exploitation. 4. Implement strict access controls and monitoring on legacy systems that may still run cfingerd to detect unauthorized activities promptly. 5. Consider migrating legacy services to modern, supported alternatives that do not have known privilege escalation vulnerabilities. 6. Conduct regular security audits and vulnerability assessments to identify and remediate outdated services and configurations. 7. Employ host-based intrusion detection systems (HIDS) to monitor for suspicious privilege escalation attempts.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df16c

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 6:39:32 PM

Last updated: 2/7/2026, 10:18:46 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats