CVE-2001-1389

Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.8_pre3:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre1:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre2:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre3:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre5:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre7:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre8:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre9:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre10:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre11:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre12:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre13:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre14:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre15:*:*:*:*:*:*:*
cpe:2.3:a:xinetd:xinetd:2.3.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:37

Type Values Removed Values Added
References () http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-033-01 - () http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-033-01 -
References () http://marc.info/?l=bugtraq&m=99913751525583&w=2 - () http://marc.info/?l=bugtraq&m=99913751525583&w=2 -
References () http://rhn.redhat.com/errata/RHSA-2001-109.html - Patch, Vendor Advisory () http://rhn.redhat.com/errata/RHSA-2001-109.html - Patch, Vendor Advisory
References () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-076.php3 - Vendor Advisory () http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-076.php3 - Vendor Advisory
References () http://www.securityfocus.com/bid/3257 - () http://www.securityfocus.com/bid/3257 -

Information

Published : 2001-08-29 04:00

Updated : 2024-11-20 23:37


NVD link : CVE-2001-1389

Mitre link : CVE-2001-1389

CVE.ORG link : CVE-2001-1389


JSON object : View

Products Affected

xinetd

  • xinetd