Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2001:055-1: xinetd

Vulnerability Assessment Details

MDKSA-2001:055-1: xinetd

Vulnerability Assessment Summary
Check for the version of the xinetd package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2001:055-1 (xinetd).

A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with TCP
connections with the WAIT state that prevents linuxconf-web from working
properly. As well, xinetd contains a security flaw in which it defaults to a
umask of 0. This means that applications using the xinetd umask that do not set
permissions themselves (like SWAT, a web configuration tool for Samba), will
create world writable files. This update sets the default umask to 022.
This update forces the TMPDIR to /tmp instead of obtaining it from the root user
by default, which uses /root/tmp. As well, this version of xinetd also fixed a
possible buffer overflow in the logging code that was reported by zen-parse on
bugtraq, but was not mentioned in the previous advisory.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

White Samsung Galaxy Tab 3 10.1" 16GB GT-P5210 Tablet G054 DOESNT CHARGE (nl 10)
White Samsung Galaxy Tab 3 10.1


No Discussions have been posted on this vulnerability.