Rapid7 Vulnerability & Exploit Database

RHSA-2003:228: Updated xinetd packages fix denial-of-service attacks and other bugs

Back to Search

RHSA-2003:228: Updated xinetd packages fix denial-of-service attacks and other bugs

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
05/05/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated xinetd packages for Red Hat Linux on IBM iSeries and pSeries systems that fix a security vulnerability and two denial of service vulnerabilities are now avaliable.

Xinetd is a 'master server' that is used to to accept service connection requests and start the appropriate servers. Versions of Xinetd prior to 2.3.7 leak file descriptors for the signal pipe to services that are launched by xinetd. This could allow an attacker to execute a DoS attack via the pipe. This issue is entered in the Common Vulnerabilities and Exposures project with the name CVE-2002-0871. Because of a programming error, memory was allocated and never freed if a connection was refused for any reason. An attacker could exploit this flaw to crash the xinetd server, rendering all services it controls unavaliable. The Common Vulnerabilities and Exposures project has assigned the name CAN-2003-0211 to this issue. In addition, other flaws in xinetd could cause incorrect operation in certain unusual server configurations. All users of xinetd are advised to update to the packages listed in this erratum, which contain an upgrade to xinetd-2.3.11 and are not vulnerable to these issues.

Solution(s)

  • redhat-upgrade-xinetd

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;