Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2013-4342: xinetd ignores user and group directives for TCPMUX services #10

Merged

Conversation

octurite
Copy link
Contributor

@octurite octurite commented Oct 3, 2013

Originally reported to Debian in 2005 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324678 and rediscovered https://bugzilla.redhat.com/show_bug.cgi?id=1006100, xinetd would execute configured TCPMUX services without dropping privilege to match the service configuration allowing the service to run with same privilege as the xinetd process (root).

…ervices

Originally reported to Debian in 2005 <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=324678> and rediscovered <https://bugzilla.redhat.com/show_bug.cgi?id=1006100>, xinetd would execute TCPMUX services without dropping privilege to match the service configuration allowing the service to run with same privilege as the xinetd process (root).
synacknet added a commit that referenced this pull request Jan 5, 2016
CVE-2013-4342: xinetd ignores user and group directives for TCPMUX services
@synacknet synacknet merged commit e7c1ba4 into xinetd-org:master Jan 5, 2016
@zr000
Copy link

zr000 commented Apr 26, 2016

Does SUSE Linux Enterprise Server 10 SP2 is affected by the vulnerability?

ismaell pushed a commit to ismaell/xinetd that referenced this pull request Aug 26, 2021
configure: add a --without-rpc flag
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants