Skip to main content

CVE-1999-1165: GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could al

High
VulnerabilityCVE-1999-1165cve-1999-1165
Published: Wed Jul 21 1999 (07/21/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: gnu
Product: fingerd

Description

GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files.

AI-Powered Analysis

AILast updated: 06/27/2025, 19:24:46 UTC

Technical Analysis

CVE-1999-1165 is a high-severity vulnerability affecting GNU fingerd version 1.37, a daemon that provides finger protocol services to query user information on Unix-like systems. The core issue is that fingerd 1.37 does not properly drop elevated privileges before accessing user information files such as .fingerrc, .plan, .forward, or .project. This improper privilege management allows a local attacker to exploit two main attack vectors: (1) by placing a malicious program in the .fingerrc file, an attacker can escalate their privileges to root, effectively gaining full control over the system; (2) by leveraging symbolic links in .plan, .forward, or .project files, an attacker can read arbitrary files on the system, potentially exposing sensitive information. The vulnerability is local, requiring access to the system, but does not require authentication, and the attack complexity is low. The CVSS v2 score of 7.2 reflects the critical impact on confidentiality, integrity, and availability due to privilege escalation and unauthorized file access. No patches are available, and no known exploits in the wild have been reported, likely due to the age of the software and its declining use. However, systems still running this outdated version remain at risk if local access is obtained.

Potential Impact

For European organizations, the impact of this vulnerability depends largely on whether GNU fingerd 1.37 is in use within their infrastructure. While fingerd is largely obsolete and replaced by more secure alternatives, legacy systems or specialized environments might still run this daemon. Successful exploitation could lead to full system compromise via root privilege escalation, allowing attackers to manipulate system configurations, install persistent malware, or exfiltrate sensitive data. The ability to read arbitrary files could expose confidential information, including user credentials, configuration files, or proprietary data. This poses a significant risk to organizations handling sensitive personal data under GDPR, as unauthorized access and data breaches could lead to regulatory penalties and reputational damage. Additionally, compromised systems could be leveraged as footholds for lateral movement within networks, increasing the risk of broader organizational compromise.

Mitigation Recommendations

Given the absence of an official patch, European organizations should prioritize the following mitigations: (1) Identify and inventory all systems running GNU fingerd 1.37 or similar legacy finger daemons. (2) Disable the fingerd service entirely if it is not strictly necessary, as the finger protocol is largely deprecated and considered insecure. (3) If the service must remain active, run it within a restricted environment or container with minimal privileges and access controls to limit potential damage. (4) Implement strict file system permissions to prevent local users from modifying .fingerrc, .plan, .forward, or .project files, and disallow symbolic links in these files. (5) Monitor local user activities and audit logs for suspicious access patterns or privilege escalations. (6) Consider migrating to modern, secure user information services that follow current security best practices. (7) Enforce strong local user account controls and limit local access to trusted personnel only.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df10f

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:24:46 PM

Last updated: 8/2/2025, 8:13:56 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats