4.3
CVSSv2

CVE-2012-0862

Published: 04/06/2012 Updated: 29/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

builtins.c in Xinetd prior to 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote malicious users to bypass intended access restrictions via a request to tcpmux port 1.

Vulnerable Product Search on Vulmon Subscribe to Product

xinetd xinetd 2.3.9

xinetd xinetd 2.3.8

xinetd xinetd 2.3.11

xinetd xinetd 2.3.10

xinetd xinetd 2.3.7

xinetd xinetd 2.3.6

xinetd xinetd 2.3.13

xinetd xinetd 2.3.12

xinetd xinetd 2.3.5

xinetd xinetd

Vendor Advisories

Debian Bug report logs - #672381 CVE-2012-0862: enables unintentional services over tcpmux port Package: xinetd; Maintainer for xinetd is Salvo 'LtWorf' Tomaselli <tiposchi@tiscaliit>; Source for xinetd is src:xinetd (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Thu, 10 May ...
Synopsis Low: xinetd security and bug fix update Type/Severity Security Advisory: Low Topic An updated xinetd package that fixes one security issue and two bugs is nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having lowsecurity impact A Common Vuln ...
Synopsis Low: xinetd security and bug fix update Type/Severity Security Advisory: Low Topic An updated xinetd package that fixes one security issue and two bugs is nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having lowsecurity impact A Common Vuln ...