Buffer overflow in Linux xinetd 2.1.8.9pre11-1 and earlier may allow remote attackers to execute arbitrary code via a long ident response, which is not properly handled by the svc_logprint function.
| Software | From | Fixed in |
|---|---|---|
| suse / suse_linux | 6.2 | 6.2.x |
| debian / debian_linux | - | 2.1.8.8.p3-1.1.x |
| suse / suse_linux | 7.2 | 7.2.x |
| suse / suse_linux | 6.0 | 6.0.x |
| suse / suse_linux | 6.1 | 6.1.x |
| suse / suse_linux | 7.0 | 7.0.x |
| suse / suse_linux | 7.1 | 7.1.x |
| suse / suse_linux | 6.3 | 6.3.x |
| suse / suse_linux | 6.4 | 6.4.x |