CentOS 5 / 6 : xinetd (CESA-2013:1409)

high Nessus Plugin ID 70344

Synopsis

The remote CentOS host is missing a security update.

Description

An updated xinetd package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The xinetd package provides a secure replacement for inetd, the Internet services daemon. xinetd provides access control for all services based on the address of the remote host and/or on time of access, and can prevent denial-of-access attacks.

It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342)

Red Hat would like to thank Thomas Swan of FedEx for reporting this issue.

All xinetd users are advised to upgrade to this updated package, which contains a backported patch to correct this issue.

Solution

Update the affected xinetd package.

See Also

http://www.nessus.org/u?9cd40e42

http://www.nessus.org/u?51fdf0d4

Plugin Details

Severity: High

ID: 70344

File Name: centos_RHSA-2013-1409.nasl

Version: 1.10

Type: local

Agent: unix

Published: 10/9/2013

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2013-4342

Vulnerability Information

CPE: p-cpe:/a:centos:centos:xinetd, cpe:/o:centos:centos:5, cpe:/o:centos:centos:6

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 10/7/2013

Vulnerability Publication Date: 10/10/2013

Reference Information

CVE: CVE-2013-4342

BID: 62871

RHSA: 2013:1409