Lucene search

K
centosCentOS ProjectCESA-2013:1409
HistoryOct 07, 2013 - 9:45 p.m.

xinetd security update

2013-10-0721:45:03
CentOS Project
lists.centos.org
54

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%

CentOS Errata and Security Advisory CESA-2013:1409

The xinetd package provides a secure replacement for inetd, the Internet
services daemon. xinetd provides access control for all services based on
the address of the remote host and/or on time of access, and can prevent
denial-of-access attacks.

It was found that xinetd ignored the user and group configuration
directives for services running under the tcpmux-server service. This flaw
could cause the associated services to run as root. If there was a flaw in
such a service, a remote attacker could use it to execute arbitrary code
with the privileges of the root user. (CVE-2013-4342)

Red Hat would like to thank Thomas Swan of FedEx for reporting this issue.

All xinetd users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-October/082129.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-October/027157.html

Affected packages:
xinetd

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1409

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%