xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
References
Configurations
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2013-1409.html - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=1006100 - Exploit, Patch | |
References | () https://github.com/xinetd-org/xinetd/pull/10 - | |
References | () https://security.gentoo.org/glsa/201611-06 - |
Information
Published : 2013-10-10 00:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4342
Mitre link : CVE-2013-4342
CVE.ORG link : CVE-2013-4342
JSON object : View
Products Affected
xinetd
- xinetd
redhat
- enterprise_linux
CWE
CWE-264
Permissions, Privileges, and Access Controls