FreeBSD advisory for xinted

34

Author: JT Smith

“The xinetd port, versions prior to xinetd-2.3.0, contains a
potentially exploitable buffer overflow in the logging routines.
If xinetd is configured to log the userid of remote clients obtained
via the RFC1413 ident service, a remote user may be able to cause
xinetd to crash by returning a specially-crafted ident response. This
may also potentially execute arbitrary code as the user running
xinetd, normally root.” Full details at LinuxSecurity.com.

Category:

  • Linux