7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.01 Low
EPSS
Percentile
83.7%
CentOS Errata and Security Advisory CESA-2013:1409
The xinetd package provides a secure replacement for inetd, the Internet
services daemon. xinetd provides access control for all services based on
the address of the remote host and/or on time of access, and can prevent
denial-of-access attacks.
It was found that xinetd ignored the user and group configuration
directives for services running under the tcpmux-server service. This flaw
could cause the associated services to run as root. If there was a flaw in
such a service, a remote attacker could use it to execute arbitrary code
with the privileges of the root user. (CVE-2013-4342)
Red Hat would like to thank Thomas Swan of FedEx for reporting this issue.
All xinetd users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-October/082129.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-October/027157.html
Affected packages:
xinetd
Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1409
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.i686.rpm |
CentOS | 6 | x86_64 | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.x86_64.rpm |
CentOS | 5 | i386 | xinetd | < 2.3.14-20.el5_10 | xinetd-2.3.14-20.el5_10.i386.rpm |
CentOS | 5 | x86_64 | xinetd | < 2.3.14-20.el5_10 | xinetd-2.3.14-20.el5_10.x86_64.rpm |