GLSA Advocate

Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Nov 15, 2016 8:26 am Post subject: [ GLSA 201611-06 ] xinetd |
|
|
Gentoo Linux Security Advisory
Title: xinetd: Privilege escalation (GLSA 201611-06)
Severity: normal
Exploitable: remote
Date: November 15, 2016
Bug(s): #488158
ID: 201611-06
Synopsis
A vulnerability in xinetd could lead to privilege escalation.
Background
xinetd is a secure replacement for inetd.
Affected Packages
Package: sys-apps/xinetd
Vulnerable: < 2.3.15-r2
Unaffected: >= 2.3.15-r2
Architectures: All supported architectures
Description
Xinetd does not enforce the user and group configuration directives for
TCPMUX services, which causes these services to be run as root.
Impact
Attackers could escalate privileges outside of the running process.
Workaround
There is no known workaround at this time.
Resolution
All xinetd users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2"
|
References
CVE-2013-4342 |
|