xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.956Z
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4342

No data.

Status : Modified
Published: 2013-10-10T00:55:14.960
Modified: 2024-11-21T01:55:23.273
Link: CVE-2013-4342
