handleAccept in rinetd before 0.62 does not properly resize the connection list when it becomes full and sets an array index incorrectly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of connections.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rinetd | Rinetd | 0.52 (including) | 0.52 (including) |
Rinetd | Rinetd | 0.61 (including) | 0.61 (including) |