![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2014.0871.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2014:0871-1) |
Summary: | The remote host is missing an update for the 'xinetd' package(s) announced via the SUSE-SU-2014:0871-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'xinetd' package(s) announced via the SUSE-SU-2014:0871-1 advisory. Vulnerability Insight: Xinetd receives a LTSS roll-up update to fix two security issues. * CVE-2012-0862: xinetd enabled all services when tcp multiplexing is used. * CVE-2013-4342: xinetd ignored user and group directives for tcpmux services, running services as root. While both issues are not so problematic on their own, in combination the impact is greater and enabling tcpmux would be risky. Security Issues: * CVE-2013-4342 * CVE-2012-0862 Affected Software/OS: 'xinetd' package(s) on SUSE Linux Enterprise Server 10-SP3, SUSE Linux Enterprise Server 10-SP4, SUSE Linux Enterprise Server 11-SP1, SUSE Linux Enterprise Server 11-SP2. Solution: Please install the updated package(s). CVSS Score: 7.6 CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0862 BugTraq ID: 53720 http://www.securityfocus.com/bid/53720 http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081446.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081428.html http://www.mandriva.com/security/advisories?name=MDVSA-2012:155 https://bugzilla.redhat.com/attachment.cgi?id=583311 https://bugzilla.redhat.com/show_bug.cgi?id=790940 http://www.openwall.com/lists/oss-security/2012/05/09/5 http://www.openwall.com/lists/oss-security/2012/05/10/2 http://www.osvdb.org/81774 RedHat Security Advisories: RHSA-2013:1302 http://rhn.redhat.com/errata/RHSA-2013-1302.html http://www.securitytracker.com/id?1027050 XForce ISS Database: xinetd-tcpmux-weak-security(75965) https://exchange.xforce.ibmcloud.com/vulnerabilities/75965 Common Vulnerability Exposure (CVE) ID: CVE-2013-4342 GLSA-201611-06 https://security.gentoo.org/glsa/201611-06 RHSA-2013:1409 http://rhn.redhat.com/errata/RHSA-2013-1409.html https://bugzilla.redhat.com/show_bug.cgi?id=1006100 https://github.com/xinetd-org/xinetd/pull/10 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |