Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-0862

Опубликовано: 04 июн. 2012
Источник: debian
EPSS Низкий

Описание

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xinetdfixed1:2.3.14-7.1package
xinetdno-dsasqueezepackage

EPSS

Процентиль: 66%
0.00535
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

redhat
больше 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

nvd
около 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

github
больше 3 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

oracle-oval
почти 12 лет назад

ELSA-2013-1302: xinetd security and bug fix update (LOW)

EPSS

Процентиль: 66%
0.00535
Низкий