[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2013-232 ---- xinetd

ID: oval:org.secpod.oval:def:1600279Date: (C)2016-05-19   (M)2023-12-07
Class: PATCHFamily: unix




It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user

Platform:
Amazon Linux AMI
Product:
xinetd
Reference:
ALAS-2013-232
CVE-2013-4342
CVE    1
CVE-2013-4342
CPE    3
cpe:/o:amazon:linux
cpe:/a:xinetd:xinetd:-
cpe:/a:xinetd:xinetd

© SecPod Technologies