Scientific Linux alert SLSA-2013:1409-1 (xinetd)
From: | Pat Riehecky <riehecky@fnal.gov> | |
To: | <scientific-linux-errata@listserv.fnal.gov> | |
Subject: | Security ERRATA Moderate: xinetd on SL5.x, SL6.x i386/x86_64 | |
Date: | Wed, 9 Oct 2013 13:24:44 +0000 | |
Message-ID: | <20131009132444.22860.50777@slpackages.fnal.gov> |
Synopsis: Moderate: xinetd security update Advisory ID: SLSA-2013:1409-1 Issue Date: 2013-10-07 CVE Numbers: CVE-2013-4342 -- It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342) -- SL5 x86_64 xinetd-2.3.14-20.el5_10.x86_64.rpm xinetd-debuginfo-2.3.14-20.el5_10.x86_64.rpm i386 xinetd-2.3.14-20.el5_10.i386.rpm xinetd-debuginfo-2.3.14-20.el5_10.i386.rpm SL6 x86_64 xinetd-2.3.14-39.el6_4.x86_64.rpm xinetd-debuginfo-2.3.14-39.el6_4.x86_64.rpm i386 xinetd-2.3.14-39.el6_4.i686.rpm xinetd-debuginfo-2.3.14-39.el6_4.i686.rpm - Scientific Linux Development Team