First published: Wed Feb 15 2012(Updated: )
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xinetd Xinetd | <=2.3.14 | |
Xinetd Xinetd | =2.3.5 | |
Xinetd Xinetd | =2.3.6 | |
Xinetd Xinetd | =2.3.7 | |
Xinetd Xinetd | =2.3.8 | |
Xinetd Xinetd | =2.3.9 | |
Xinetd Xinetd | =2.3.10 | |
Xinetd Xinetd | =2.3.11 | |
Xinetd Xinetd | =2.3.12 | |
Xinetd Xinetd | =2.3.13 | |
redhat/xinetd | <2.3.15 | 2.3.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.