Lucene search

K
gentooGentoo FoundationGLSA-201611-06
HistoryNov 15, 2016 - 12:00 a.m.

xinetd: Privilege escalation

2016-11-1500:00:00
Gentoo Foundation
security.gentoo.org
193

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%

Background

xinetd is a secure replacement for inetd.

Description

Xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root.

Impact

Attackers could escalate privileges outside of the running process.

Workaround

There is no known workaround at this time.

Resolution

All xinetd users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallsys-apps/xinetd< 2.3.15-r2UNKNOWN

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%