handleAccept in rinetd before 0.62 does not properly resize the connection list when it becomes full and sets an array index incorrectly, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of connections.
| Software | From | Fixed in |
|---|---|---|
| rinetd / rinetd | 0.61 | 0.61.x |
| rinetd / rinetd | 0.52 | 0.52.x |