Xinetd Zero String Length Buffer Overflow Vulnerability

Solution:
Note: It has been reported that some vendor fixes may not completely eliminate this vulnerability. Concerned administrators are advised to install the 2.3.3 version now available for download from the Xinetd homepage.

Because it is not confirmed which vendor fixes may not completely patch this vulnerability, the existing fixes in our database will not be removed.

All administrators are urged to upgrade to version 2.3.3.


Xinetd Xinetd 2.1.8 .9pre5

Xinetd Xinetd 2.1.8 .9pre15

Xinetd Xinetd 2.1.8 .9pre7

Xinetd Xinetd 2.1.8 .9pre12

Xinetd Xinetd 2.1.8 .9pre9

Xinetd Xinetd 2.1.8 .9pre2

Xinetd Xinetd 2.1.8 .9pre11

Xinetd Xinetd 2.1.8 .9pre3

Xinetd Xinetd 2.1.8 .9pre4

Xinetd Xinetd 2.1.8 .9pre8

Xinetd Xinetd 2.1.8 .9pre13

Xinetd Xinetd 2.1.8 .8pre3

Xinetd Xinetd 2.1.8 .9pre6

Xinetd Xinetd 2.1.8 .9pre10

Xinetd Xinetd 2.1.8 .9pre1

Xinetd Xinetd 2.1.8 .8

Xinetd Xinetd 2.1.8 .9pre14

Xinetd Xinetd 2.3


 

Privacy Statement
Copyright 2010, SecurityFocus