CVE-2013-4342
- EPSS 15.27%
- Published 10.10.2013 00:55:14
- Last modified 11.04.2025 00:51:21
xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
CVE-2012-0862
- EPSS 1.04%
- Published 04.06.2012 20:55:02
- Last modified 11.04.2025 00:51:21
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
- EPSS 9.29%
- Published 05.05.2003 04:00:00
- Last modified 03.04.2025 01:03:51
Memory leak in xinetd 2.3.10 allows remote attackers to cause a denial of service (memory consumption) via a large number of rejected connections.
CVE-2002-0871
- EPSS 0.11%
- Published 05.09.2002 04:00:00
- Last modified 03.04.2025 01:03:51
xinetd 2.3.4 leaks file descriptors for the signal pipe to services that are launched by xinetd, which could allow those services to cause a denial of service via the pipe.
- EPSS 3.08%
- Published 06.12.2001 05:00:00
- Last modified 03.04.2025 01:03:51
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
CVE-2001-1389
- EPSS 2.44%
- Published 29.08.2001 04:00:00
- Last modified 03.04.2025 01:03:51
Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
CVE-2001-1322
- EPSS 0.1%
- Published 10.07.2001 04:00:00
- Last modified 03.04.2025 01:03:51
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
CVE-2000-0536
- EPSS 0.49%
- Published 04.06.2000 04:00:00
- Last modified 03.04.2025 01:03:51
xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry.