|
|
| |
|
| |
xinetd: service disclosure flaw
| Package(s): | xinetd |
CVE #(s): | CVE-2012-0862
|
| Created: | May 29, 2012 |
Updated: | October 3, 2013 |
| Description: |
From the Red Hat bugzilla:
Thomas Swan reported a service disclosure flaw in xinetd. xinetd allows for services to be configured with the TCPMUX or TCPMUXPLUS service types, which makes those services available on port 1, as per RFC 1078 [1], if the tcpmux-server service is enabled. When the tcpmux-server service is enabled, xinetd would expose _all_ enabled services via the tcpmux port, instead of just the configured service(s). This could allow a remote attacker to bypass firewall restrictions and access services via the tcpmux port. |
| Alerts: |
|
( Log in to post comments)
|
|
|