[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML view JSON

CVE-2013-4342Date: (C)2013-10-10   (M)2018-05-10


xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : CVSS Score : 7.6
Exploit Score: Exploit Score: 4.9
Impact Score: Impact Score: 10.0
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: Access Vector: NETWORK
Attack Complexity: Access Complexity: HIGH
Privileges Required: Authentication: NONE
User Interaction: Confidentiality: COMPLETE
Scope: Integrity: COMPLETE
Confidentiality: Availability: COMPLETE
Integrity:  
Availability:  
  
Reference:
GLSA-201611-06
RHSA-2013:1409
https://bugzilla.redhat.com/show_bug.cgi?id=1006100
https://github.com/xinetd-org/xinetd/pull/10

CPE    3
cpe:/a:xinetd:xinetd:-
cpe:/o:redhat:enterprise_linux:5
cpe:/o:redhat:enterprise_linux:6
CWE    1
CWE-264
OVAL    7
oval:org.secpod.oval:def:501113
oval:org.secpod.oval:def:106013
oval:org.secpod.oval:def:1300240
oval:org.secpod.oval:def:1500265
...

© SecPod Technologies