Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xinetd | Xinetd | * | 2.3.1 (including) |
Xinetd | Xinetd | 2.1.8.8 (including) | 2.1.8.8 (including) |
Xinetd | Xinetd | 2.1.8.9 (including) | 2.1.8.9 (including) |
Xinetd | Xinetd | 2.3.0 (including) | 2.3.0 (including) |
Red Hat Linux 7.0 | RedHat | * | |
Red Hat Linux 7.1 | RedHat | * |