ports/51134: Memory leak in xinetd 2.3.10 allows attackers to cause DOS
Christopher Nehren
apeiron at comcast.net
Fri Apr 18 19:50:12 UTC 2003
>Number: 51134
>Category: ports
>Synopsis: Memory leak in xinetd 2.3.10 allows attackers to cause DOS
>Confidential: no
>Severity: critical
>Priority: medium
>Responsible: freebsd-ports-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Fri Apr 18 12:50:10 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator: Christopher Nehren
>Release: FreeBSD 5.0-RELEASE-p7 i386
>Organization:
>Environment:
System: FreeBSD prophecy.dyndns.org 5.0-RELEASE-p7 FreeBSD 5.0-RELEASE-p7 #0: Thu Apr 3 22:18:32 EST 2003 root at prophecy.dyndns.org:/usr/obj/usr/src/sys/PROPHECY i386
>Description:
See http://marc.theaimsgroup.com/?l=bugtraq&m=105068673220605&w=2 for the detailed report.
>How-To-Repeat:
Ibidem.
>Fix:
Upgrade to xinetd 2.3.11, available at http://www.xinetd.org/xinetd-2.3.11.tar.gz
>Release-Note:
>Audit-Trail:
>Unformatted:
More information about the freebsd-ports-bugs
mailing list