[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0862

Date: (C)2012-06-04   (M)2017-08-29
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

Reference:
SECTRACK-1027050
BID-53720
OSVDB-81774
FEDORA-2012-8041
FEDORA-2012-8061
MDVSA-2012:155
RHSA-2013:1302
http://www.openwall.com/lists/oss-security/2012/05/09/5
http://www.openwall.com/lists/oss-security/2012/05/10/2
http://www.xinetd.org/#changes
https://bugzilla.redhat.com/attachment.cgi?id=583311
https://bugzilla.redhat.com/show_bug.cgi?id=790940
xinetd-tcpmux-weak-security(75965)

CPE    10
cpe:/a:xinetd:xinetd:2.3.13
cpe:/a:xinetd:xinetd:2.3.12
cpe:/a:xinetd:xinetd:2.3.11
cpe:/a:xinetd:xinetd:2.3.14
...
CWE    1
CWE-20
OVAL    9
oval:org.secpod.oval:def:302963
oval:org.secpod.oval:def:501099
oval:org.secpod.oval:def:103823
oval:org.secpod.oval:def:103824
...

© 2013 SecPod Technologies