Scientific Linux Security Update : xinetd on SL5.x, SL6.x i386/x86_64

High Nessus Plugin ID 70365


The remote Scientific Linux host is missing one or more security updates.


It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342)


Update the affected xinetd and / or xinetd-debuginfo packages.

See Also

Plugin Details

Severity: High

ID: 70365

File Name: sl_20131007_xinetd_on_SL5_x.nasl

Version: $Revision: 1.2 $

Type: local

Agent: unix

Published: 2013/10/10

Modified: 2013/10/11

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2013/10/07

Reference Information

CVE: CVE-2013-4342