Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Debian_linux | Debian | * | 2.1.8.8.p3-1.1 (including) |
Suse_linux | Suse | 6.0 (including) | 6.0 (including) |
Suse_linux | Suse | 6.1 (including) | 6.1 (including) |
Suse_linux | Suse | 6.2 (including) | 6.2 (including) |
Suse_linux | Suse | 6.3 (including) | 6.3 (including) |
Suse_linux | Suse | 6.4 (including) | 6.4 (including) |
Suse_linux | Suse | 7.0 (including) | 7.0 (including) |
Suse_linux | Suse | 7.1 (including) | 7.1 (including) |
Suse_linux | Suse | 7.2 (including) | 7.2 (including) |
Red Hat Linux 7.0 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * |