xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry.
References
Link | Resource |
---|---|
http://www.debian.org/security/2000/20000619 | |
http://www.securityfocus.com/bid/1381 | Exploit Patch Vendor Advisory |
http://www.synack.net/xinetd/ | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/4986 | |
http://www.debian.org/security/2000/20000619 | |
http://www.securityfocus.com/bid/1381 | Exploit Patch Vendor Advisory |
http://www.synack.net/xinetd/ | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/4986 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2000/20000619 - | |
References | () http://www.securityfocus.com/bid/1381 - Exploit, Patch, Vendor Advisory | |
References | () http://www.synack.net/xinetd/ - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/4986 - |
Information
Published : 2000-06-04 04:00
Updated : 2024-11-20 23:32
NVD link : CVE-2000-0536
Mitre link : CVE-2000-0536
CVE.ORG link : CVE-2000-0536
JSON object : View
Products Affected
xinetd
- xinetd
CWE