xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201611-06 | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1006100 | patch exploit |
https://github.com/xinetd-org/xinetd/pull/10 | |
http://rhn.redhat.com/errata/RHSA-2013-1409.html | vendor advisory |