Lucene search

K
freebsdFreeBSDE11955CA-187C-11E2-BE36-00215AF774F0
HistoryFeb 15, 2012 - 12:00 a.m.

xinetd -- attackers can bypass access restrictions if tcpmux-servers service enabled

2012-02-1500:00:00
vuxml.freebsd.org
17

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.4%

Thomas Swan reports:

xinetd allows for services to be configured with the TCPMUX
or TCPMUXPLUS service types, which makes those services
available on port 1, as per RFC 1078 [1], if the tcpmux-server
service is enabled. When the tcpmux-server service is enabled,
xinetd would expose all enabled services via the tcpmux port,
instead of just the configured service(s). This could allow
a remote attacker to bypass firewall restrictions and access
services via the tcpmux port.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxinetd< 2.3.15UNKNOWN

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.005

Percentile

75.4%