CVE-2013-4342

xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
Configurations

Configuration 1 (hide)

cpe:2.3:a:xinetd:xinetd:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2013-1409.html - () http://rhn.redhat.com/errata/RHSA-2013-1409.html -
References () https://bugzilla.redhat.com/show_bug.cgi?id=1006100 - Exploit, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=1006100 - Exploit, Patch
References () https://github.com/xinetd-org/xinetd/pull/10 - () https://github.com/xinetd-org/xinetd/pull/10 -
References () https://security.gentoo.org/glsa/201611-06 - () https://security.gentoo.org/glsa/201611-06 -

Information

Published : 2013-10-10 00:55

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4342

Mitre link : CVE-2013-4342

CVE.ORG link : CVE-2013-4342


JSON object : View

Products Affected

xinetd

  • xinetd

redhat

  • enterprise_linux
CWE
CWE-264

Permissions, Privileges, and Access Controls