ALAS-2013-232


Amazon Linux AMI Security Advisory: ALAS-2013-232
Advisory Release Date: 2014-09-16 21:41 Pacific
Severity: Medium

Issue Overview:

It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342 )


Affected Packages:

xinetd


Issue Correction:
Run yum update xinetd to update your system.

New Packages:
i686:
    xinetd-2.3.14-39.9.amzn1.i686
    xinetd-debuginfo-2.3.14-39.9.amzn1.i686

src:
    xinetd-2.3.14-39.9.amzn1.src

x86_64:
    xinetd-debuginfo-2.3.14-39.9.amzn1.x86_64
    xinetd-2.3.14-39.9.amzn1.x86_64