Rapid7 Vulnerability & Exploit Database

CESA-2003:161: xinetd security update

Free InsightVM Trial No credit card necessary
Watch Demo See how it all works
Back to Search

CESA-2003:161: xinetd security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
05/05/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated xinetd packages fix a security vulnerability and other bugs.

Xinetd is a master server that is used to to accept service connection requests and start the appropriate servers. Because of a programming error, memory was allocated and never freed if a connection was refused for any reason. An attacker could exploit this flaw to crash the xinetd server, rendering all services it controls unavaliable. In addition, other flaws in xinetd could cause incorrect operation in certain unusual server configurations. All users of xinetd are advised to update to the packages listed in this erratum, which contain an upgrade to xinetd-2.3.11 and are not vulnerable to these issues.

Solution(s)

  • centos-upgrade-xinetd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;