Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2001:055-1: xinetd Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the xinetd package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2001:055-1 (xinetd).
A bug exists in xinetd as shipped with Mandrake Linux 8.0 dealing with TCP
connections with the WAIT state that prevents linuxconf-web from working
properly. As well, xinetd contains a security flaw in which it defaults to a
umask of 0. This means that applications using the xinetd umask that do not set
permissions themselves (like SWAT, a web configuration tool for Samba), will
create world writable files. This update sets the default umask to 022.
This update forces the TMPDIR to /tmp instead of obtaining it from the root user
by default, which uses /root/tmp. As well, this version of xinetd also fixed a
possible buffer overflow in the logging code that was reported by zen-parse on
bugtraq, but was not mentioned in the previous advisory.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2001:055-1
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.