7.6 High
CVSS2
Access Vector
NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:C/I:C/A:C
0.009 Low
EPSS
Percentile
80.1%
The xinetd package provides a secure replacement for inetd, the Internet
services daemon. xinetd provides access control for all services based on
the address of the remote host and/or on time of access, and can prevent
denial-of-access attacks.
It was found that xinetd ignored the user and group configuration
directives for services running under the tcpmux-server service. This flaw
could cause the associated services to run as root. If there was a flaw in
such a service, a remote attacker could use it to execute arbitrary code
with the privileges of the root user. (CVE-2013-4342)
Red Hat would like to thank Thomas Swan of FedEx for reporting this issue.
All xinetd users are advised to upgrade to this updated package, which
contains a backported patch to correct this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 6 | s390x | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.s390x.rpm |
RedHat | 6 | s390x | xinetd-debuginfo | < 2.3.14-39.el6_4 | xinetd-debuginfo-2.3.14-39.el6_4.s390x.rpm |
RedHat | 6 | ppc64 | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.ppc64.rpm |
RedHat | 6 | x86_64 | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.x86_64.rpm |
RedHat | 5 | src | xinetd | < 2.3.14-20.el5_10 | xinetd-2.3.14-20.el5_10.src.rpm |
RedHat | 5 | s390x | xinetd-debuginfo | < 2.3.14-20.el5_10 | xinetd-debuginfo-2.3.14-20.el5_10.s390x.rpm |
RedHat | 5 | x86_64 | xinetd-debuginfo | < 2.3.14-20.el5_10 | xinetd-debuginfo-2.3.14-20.el5_10.x86_64.rpm |
RedHat | 5 | i386 | xinetd-debuginfo | < 2.3.14-20.el5_10 | xinetd-debuginfo-2.3.14-20.el5_10.i386.rpm |
RedHat | 6 | i686 | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.i686.rpm |
RedHat | 6 | src | xinetd | < 2.3.14-39.el6_4 | xinetd-2.3.14-39.el6_4.src.rpm |