ports/51134: Memory leak in xinetd 2.3.10 allows attackers to cause DOS

Christopher Nehren apeiron at comcast.net
Fri Apr 18 19:50:12 UTC 2003


>Number:         51134
>Category:       ports
>Synopsis:       Memory leak in xinetd 2.3.10 allows attackers to cause DOS
>Confidential:   no
>Severity:       critical
>Priority:       medium
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Fri Apr 18 12:50:10 PDT 2003
>Closed-Date:
>Last-Modified:
>Originator:     Christopher Nehren
>Release:        FreeBSD 5.0-RELEASE-p7 i386
>Organization:
>Environment:
System: FreeBSD prophecy.dyndns.org 5.0-RELEASE-p7 FreeBSD 5.0-RELEASE-p7 #0: Thu Apr 3 22:18:32 EST 2003 root at prophecy.dyndns.org:/usr/obj/usr/src/sys/PROPHECY i386

>Description:
See http://marc.theaimsgroup.com/?l=bugtraq&m=105068673220605&w=2 for the detailed report. 

>How-To-Repeat:
Ibidem.
>Fix:
Upgrade to xinetd 2.3.11, available at http://www.xinetd.org/xinetd-2.3.11.tar.gz
>Release-Note:
>Audit-Trail:
>Unformatted:



More information about the freebsd-ports-bugs mailing list