[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96078

 
 

909

 
 

78009

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2013-4342

Date: (C)2013-10-10   (M)2017-07-06
 
CVSS Score: 7.6Access Vector: NETWORK
Exploitability Subscore: 4.9Access Complexity: HIGH
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.

Reference:
GLSA-201611-06
RHSA-2013:1409
https://bugzilla.redhat.com/show_bug.cgi?id=1006100
https://github.com/xinetd-org/xinetd/pull/10

CPE    3
cpe:/a:xinetd:xinetd:-
cpe:/o:redhat:enterprise_linux:5
cpe:/o:redhat:enterprise_linux:6
CWE    1
CWE-264
OVAL    7
oval:org.secpod.oval:def:1300240
oval:org.secpod.oval:def:501113
oval:org.secpod.oval:def:1500274
oval:org.secpod.oval:def:1500265
...

© 2013 SecPod Technologies