Amazon Linux 1 Security Advisory: ALAS-2013-232
Advisory Release Date: 2013-10-16 20:53 Pacific
Advisory Updated Date: 2014-09-16 21:41 Pacific
It was found that xinetd ignored the user and group configuration directives for services running under the tcpmux-server service. This flaw could cause the associated services to run as root. If there was a flaw in such a service, a remote attacker could use it to execute arbitrary code with the privileges of the root user. (CVE-2013-4342)
Affected Packages:
xinetd
Issue Correction:
Run yum update xinetd to update your system.
i686:
xinetd-2.3.14-39.9.amzn1.i686
xinetd-debuginfo-2.3.14-39.9.amzn1.i686
src:
xinetd-2.3.14-39.9.amzn1.src
x86_64:
xinetd-debuginfo-2.3.14-39.9.amzn1.x86_64
xinetd-2.3.14-39.9.amzn1.x86_64