Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Xinetd | Xinetd | * | 2.3.1 (including) |
| Xinetd | Xinetd | 2.1.8.8 (including) | 2.1.8.8 (including) |
| Xinetd | Xinetd | 2.1.8.9 (including) | 2.1.8.9 (including) |
| Xinetd | Xinetd | 2.3.0 (including) | 2.3.0 (including) |
| Red Hat Linux 7.0 | RedHat | * | |
| Red Hat Linux 7.1 | RedHat | * |