Vulnerability Bulletins |
Denegación de servicio en xinetd |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Denegación de Servicio |
Dificulty | Experto |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
Red Hat Linux 7.1 - i386 Red Hat Linux 7.2 - i386, ia64 Red Hat Linux 7.3 - i386 Red Hat Linux 8.0 - i386 Red Hat Linux 9 - i386 Mandrake Corporate Server 2.1 Mandrake Linux 8.2 Mandrake Linux 8.2/PPC Mandrake Linux 9.0 Mandrake Linux 9.1 Mandrake Linux 9.1/PPC Mandrake Network Firewall 7.2 Mandrake Multi Network Firewall 8.2 Mandrake Single Network Firewall 7.2 |
Description |
|
Se ha descubierto una vulnerabilidad en el demonio xinetd que permite a un atacante remoto tirar el servidor xinetd. Cuando una conexión es rechazada por cualquier razón, existe memoria reservada que nunca es liberada. Un atacante puede explotar esto para impedir la disponibilidad de los servicios que el demonio xinetd controla, causando una denegación de servicio. Además, otros fallos en xinetd pueden causar operaciones incorrectas en ciertas configuraciones (inusuales) del servidor. Aunque sólo Linux RedHat y Linux Mandrake han mencionado este problema, este fallo afecta potencialmente a todas las distribuciones Unix/Linux que usan "xinetd". Este aviso será actualizado consecuentemente. |
|
Solution |
|
Aplique los mecanismos de actualización propios de su distribución, o bien obtenga las fuentes del software y compílelo usted mismo. Actualización de software xinetd Fuentes http://www.xinetd.org Red Hat Linux Red Hat Linux 7.1 SRPMS ftp://updates.redhat.com/7.1/en/os/SRPMS/xinetd-2.3.11-1.7x.src.rpm i386 ftp://updates.redhat.com/7.1/en/os/i386/xinetd-2.3.11-1.7x.i386.rpm Red Hat Linux 7.2 SRPMS ftp://updates.redhat.com/7.2/en/os/SRPMS/xinetd-2.3.11-1.7x.src.rpm i386 ftp://updates.redhat.com/7.2/en/os/i386/xinetd-2.3.11-1.7x.i386.rpm ia64 ftp://updates.redhat.com/7.2/en/os/ia64/xinetd-2.3.11-1.7x.ia64.rpm Red Hat Linux 7.3 SRPMS ftp://updates.redhat.com/7.3/en/os/SRPMS/xinetd-2.3.11-1.7x.src.rpm i386 ftp://updates.redhat.com/7.3/en/os/i386/xinetd-2.3.11-1.7x.i386.rpm Red Hat Linux 8.0 SRPMS ftp://updates.redhat.com/8.0/en/os/SRPMS/xinetd-2.3.11-1.8.0.src.rpm i386 ftp://updates.redhat.com/8.0/en/os/i386/xinetd-2.3.11-1.8.0.i386.rpm Red Hat Linux 9 SRPMS ftp://updates.redhat.com/9/en/os/SRPMS/xinetd-2.3.11-1.9.0.src.rpm i386 ftp://updates.redhat.com/9/en/os/i386/xinetd-2.3.11-1.9.0.i386.rpm Mandrake Linux Mandrake Corporate Server 2.1 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/corporate/2.1/RPMS/xinetd-2.3.11-1.1mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/corporate/2.1/RPMS/xinetd-ipv6-2.3.11-1.1mdk.i586.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/corporate/2.1/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm Mandrake Linux 8.2 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/8.2/RPMS/xinetd-2.3.11-1.1mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/8.2/RPMS/xinetd-ipv6-2.3.11-1.1mdk.i586.rpm PPC ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/8.2/RPMS/xinetd-2.3.11-1.1mdk.ppc.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/8.2/RPMS/xinetd-ipv6-2.3.11-1.1mdk.ppc.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/8.2/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/8.2/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm Mandrake Linux 9.0 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.0/RPMS/xinetd-2.3.11-1.1mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.0/RPMS/xinetd-ipv6-2.3.11-1.1mdk.i586.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.0/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm Mandrake Linux 9.1 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.1/RPMS/xinetd-2.3.11-1.1mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.1/RPMS/xinetd-ipv6-2.3.11-1.1mdk.i586.rpm PPC ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/9.1/RPMS/xinetd-2.3.11-1.1mdk.ppc.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/9.1/RPMS/xinetd-ipv6-2.3.11-1.1mdk.ppc.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/9.1/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/ppc/9.1/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm Mandrake Multi Network Firewall 8.2 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/mnf8.2/RPMS/xinetd-2.3.11-1.1mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/mnf8.2/RPMS/xinetd-ipv6-2.3.11-1.1mdk.i586.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/mnf8.2/SRPMS/xinetd-2.3.11-1.1mdk.src.rpm Mandrake Single Network Firewall 7.2 i586 ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/snf7.2/RPMS/xinetd-2.3.11-1.2mdk.i586.rpm ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/snf7.2/RPMS/xinetd-ipv6-2.3.11-1.2mdk.i586.rpm SRPMS ftp://ftp.linux.tucows.com/pub/distributions/Mandrake/Mandrake/updates/snf7.2/SRPMS/xinetd-2.3.11-1.2mdk.src.rpm |
|
Standar resources |
|
Property | Value |
CVE | CAN-2003-0211 |
BID | |
Other resources |
|
Linux Mandrake security advisory MDKSA-2003:056 14/5/2003 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:056 Linux RedHat security advisory RHSA-2003:160-01 13/5/2003 https://rhn.redhat.com/errata/RHSA-2003-160.html |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2003-05-20 |