Amazon Linux AMI Security Advisory: ALAS-2013-232
Advisory Release Date: 2014-09-16 21:41 Pacific
It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342 )
Run yum update xinetd to update your system.