Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
Software | From | Fixed in |
---|---|---|
debian / debian_linux | - | 2.1.8.8.p3-1.1.x |
suse / suse_linux | 6.0 | 6.0.x |
suse / suse_linux | 6.1 | 6.1.x |
suse / suse_linux | 6.2 | 6.2.x |
suse / suse_linux | 6.3 | 6.3.x |
suse / suse_linux | 6.4 | 6.4.x |
suse / suse_linux | 7.0 | 7.0.x |
suse / suse_linux | 7.1 | 7.1.x |
suse / suse_linux | 7.2 | 7.2.x |