Buffer Overflow in xinetd Affects Open Source Linux Distributions
CVE-2001-0763
Currently unrated
Summary
A buffer overflow vulnerability exists in xinetd, specifically in versions 2.1.8.9pre11-1 and earlier. This issue arises from improper handling of a long ident response by the svc_logprint function, which could allow remote attackers to execute arbitrary code. Administrators are advised to apply patches or upgrade to later versions to mitigate potential exploitation risks.
References
EPSS Score
25% chance of being exploited in the next 30 days.
Timeline
Vulnerability published
Vulnerability Reserved