cvelist/2013/4xxx/CVE-2013-4342.json

77 lines
2.4 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-17 23:24:06 +00:00
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4342",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
2017-10-16 12:31:07 -04:00
{
2019-03-17 23:24:06 +00:00
"lang": "eng",
"value": "xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service."
2017-10-16 12:31:07 -04:00
}
2019-03-17 23:24:06 +00:00
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "GLSA-201611-06",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201611-06"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1006100",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1006100"
},
{
"name": "https://github.com/xinetd-org/xinetd/pull/10",
"refsource": "CONFIRM",
"url": "https://github.com/xinetd-org/xinetd/pull/10"
},
{
"name": "RHSA-2013:1409",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2013-1409.html"
}
]
}
}