Summary
The remote host is missing an update to xinetd
announced via advisory DSA 063-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20063-1
Insight
zen-parse reported on bugtraq that there is a possible buffer overflow in the logging code from xinetd. This could be triggered by using a fake identd that returns special replies when xinetd does an ident request.
Another problem is that xinetd sets it umask to 0. As a result any programs that xinetd start that are not careful with file permissions will create world-writable files.
Both problems have been fixed in version 2.1.8.8.p3-1.1 .
Severity
Classification
-
CVE CVE-2001-0763, CVE-2001-1322 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities