xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
References
Information
Published : 2013-10-09 17:55
Updated : 2023-02-12 20:46
NVD link : CVE-2013-4342
Mitre link : CVE-2013-4342
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
xinetd
- xinetd
redhat
- enterprise_linux