Lucene search

K
mageiaGentoo FoundationMGASA-2013-0302
HistoryOct 10, 2013 - 2:47 a.m.

Updated xinetd package fixes security vulnerability

2013-10-1002:47:09
Gentoo Foundation
advisories.mageia.org
11

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%

It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user (CVE-2013-4342).

OSVersionArchitecturePackageVersionFilename
Mageia2noarchxinetd< 2.3.15-1.1xinetd-2.3.15-1.1.mga2
Mageia3noarchxinetd< 2.3.15-3.1xinetd-2.3.15-3.1.mga3

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.01 Low

EPSS

Percentile

83.7%