Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-0862

Опубликовано: 04 июн. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

РелизСтатусПримечание
artful

not-affected

1:2.3.15-1ubuntu1
bionic

not-affected

1:2.3.15-1ubuntu1
cosmic

not-affected

1:2.3.15-1ubuntu1
devel

not-affected

1:2.3.15-1ubuntu1
disco

not-affected

1:2.3.15-1ubuntu1
eoan

not-affected

1:2.3.15-1ubuntu1
esm-apps/bionic

not-affected

1:2.3.15-1ubuntu1
esm-apps/focal

not-affected

1:2.3.15-1ubuntu1
esm-infra-legacy/trusty

not-affected

1:2.3.15-1ubuntu1
esm-infra/xenial

not-affected

1:2.3.15-1ubuntu1

Показывать по

EPSS

Процентиль: 66%
0.00535
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
больше 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

nvd
около 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

debian
около 13 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type whe ...

github
больше 3 лет назад

builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.

oracle-oval
почти 12 лет назад

ELSA-2013-1302: xinetd security and bug fix update (LOW)

EPSS

Процентиль: 66%
0.00535
Низкий

4.3 Medium

CVSS2