|
|
Subscribe / Log in / New account

Scientific Linux alert SLSA-2013:1409-1 (xinetd)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Moderate: xinetd on SL5.x, SL6.x i386/x86_64
Date:  Wed, 9 Oct 2013 13:24:44 +0000
Message-ID:  <20131009132444.22860.50777@slpackages.fnal.gov>

Synopsis: Moderate: xinetd security update Advisory ID: SLSA-2013:1409-1 Issue Date: 2013-10-07 CVE Numbers: CVE-2013-4342 -- It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342) -- SL5 x86_64 xinetd-2.3.14-20.el5_10.x86_64.rpm xinetd-debuginfo-2.3.14-20.el5_10.x86_64.rpm i386 xinetd-2.3.14-20.el5_10.i386.rpm xinetd-debuginfo-2.3.14-20.el5_10.i386.rpm SL6 x86_64 xinetd-2.3.14-39.el6_4.x86_64.rpm xinetd-debuginfo-2.3.14-39.el6_4.x86_64.rpm i386 xinetd-2.3.14-39.el6_4.i686.rpm xinetd-debuginfo-2.3.14-39.el6_4.i686.rpm - Scientific Linux Development Team


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds