First published: Tue Sep 10 2013(Updated: )
Created <span class="bz_obsolete"><a href="attachment.cgi?id=795808&action=diff" name="attach_795808" title="preliminary patch to set credentials before execve">attachment 795808</a> <a href="attachment.cgi?id=795808&action=edit" title="preliminary patch to set credentials before execve">[details]</a></span> preliminary patch to set credentials before execve Description of problem: If a tcpmux service is enabled, the user and group directives are ignored and the service always runs as root. Verified in the xinetd codebase and affects all active versions of RHEL and Fedora. Without the fix for <a href="https://access.redhat.com/security/cve/CVE-2012-0862">CVE-2012-0862</a>, previously exposed non-tcpmux services could run as root bypassing their respective user and group restrictions. Version-Release number of selected component (if applicable): 2.3.15-6 How reproducible: Always Steps to Reproduce: 1. Enabled tcpmux-server 2. Create a sample tcpmux service service testcred { id = tcpmux-testcred disable = no user = nobody group = nobody socket_type = stream type = TCPMUXPLUS UNLISTED flags = NAMEINARGS server = /usr/bin/id server_args = id wait = no } 3. telnet localhost 1 4. type testcred Actual results: Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. testcred +Go uid=0(root) gid=0(root) groups=0(root) Expected results: Trying 127.0.0.1... Connected to localhost. Escape character is '^]'. testcred +Go uid=99(nobody) gid=99(nobody) groups=99(nobody) Additional info:
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xinetd Xinetd | ||
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4342 is rated as medium severity due to potential privilege escalation risks.
To fix CVE-2013-4342, update to the latest version of Xinetd as per your operating system's security patch.
CVE-2013-4342 affects Xinetd and Red Hat Enterprise Linux versions 5 and 6.0.
The main impact of CVE-2013-4342 is the potential for unauthorized users to gain elevated privileges.
CVE-2013-4342 may still pose a risk if the affected software has not been updated or is running legacy versions.