Vulnerabilities > Xinetd > Xinetd

DATE CVE VULNERABILITY TITLE RISK
2012-06-04 CVE-2012-0862 Improper Input Validation vulnerability in Xinetd
builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
network
xinetd CWE-20
4.3
2003-05-05 CVE-2003-0211 Unspecified vulnerability in Xinetd
Memory leak in xinetd 2.3.10 allows remote attackers to cause a denial of service (memory consumption) via a large number of rejected connections.
network
low complexity
xinetd
5.0
2002-09-05 CVE-2002-0871 Denial Of Service vulnerability in Xinetd Open File Descriptor
xinetd 2.3.4 leaks file descriptors for the signal pipe to services that are launched by xinetd, which could allow those services to cause a denial of service via the pipe.
local
low complexity
xinetd
2.1
2001-12-06 CVE-2001-0825 Buffer Overflow vulnerability in Xinetd 2.1.8.8/2.1.8.9/2.3.0
Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
network
low complexity
xinetd
critical
10.0
2001-08-29 CVE-2001-1389 Unspecified vulnerability in Xinetd
Multiple vulnerabilities in xinetd 2.3.0 and earlier, and additional variants until 2.3.3, may allow remote attackers to cause a denial of service or execute arbitrary code, primarily via buffer overflows or improper NULL termination.
network
low complexity
xinetd
7.5
2001-07-10 CVE-2001-1322 Unspecified vulnerability in Xinetd
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
local
low complexity
xinetd
3.6
2000-06-04 CVE-2000-0536 Unspecified vulnerability in Xinetd
xinetd 2.1.8.x does not properly restrict connections if hostnames are used for access control and the connecting host does not have a reverse DNS entry.
network
low complexity
xinetd
7.5