22th Oct 2001 [SBWID-4805]
COMMAND
xinetd local and remote vulnerabilities
SYSTEMS AFFECTED
All versions of xinetd prior to 2.3.1
DoS in 2.3.4
PROBLEM
In EnGarde Secure Linux Security Advisory ESA-20011019-03
(http://www.engardelinux.org/) :
Solar Designer did an audit of xinetd 2.3.0 and came up with a list of
potential vulnerabilities. This release fixes all known vulnerabilities
as a precautionary measure. Most of these fixes are in the interest of
robustness and are not known to be exploitable at this time.
For more information on the results of this audit please refer to the
AUDIT file in the xinetd-2.3.3.tar.gz tarball (included with the source
package).
Update (14 August 2002)
======
Martin Schulze in a Debian Security advisory [DSA
151-1][http://www.debian.org/security/] informs us :
Solar Designer found a vulnerability in xinetd, a replacement for the
BSD derived inetd. File descriptors for the signal pipe introduced in
version 2.3.4 are leaked into services started from xinetd. The
descriptors could be used to talk to xinetd resulting in crashing it
entirely. This is usually called a denial of service.
SOLUTION
Upgrade :
This [the more recent DoS] problem has been fixed by the package
maintainer in version 2.3.4-1.2 for the current stable distribution
(woody) and in version 2.3.7-1 for the unstable distribution (sid). The
old stable distribution (potato) is not affected, since it doesn't
contain the signal pipe.
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH