This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.
The remote Amazon Linux AMI host is missing a security update.
It was found that xinetd ignored the user and group configuration
directives for services running under the tcpmux-server service. This
flaw could cause the associated services to run as root. If there was
a flaw in such a service, a remote attacker could use it to execute
arbitrary code with the privileges of the root user. (CVE-2013-4342)
See also :
Run 'yum update xinetd' to update your system.
Risk factor :
High / CVSS Base Score : 7.6
Family: Amazon Linux Local Security Checks
Nessus Plugin ID: 70568 ()
CVE ID: CVE-2013-4342