FKIE_CVE-2001-1322

Vulnerability from fkie_nvd - Published: 2001-07-10 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask.
Impacted products
Vendor Product Version
xinetd xinetd 2.1.8.8
xinetd xinetd 2.1.8.8_pre3
xinetd xinetd 2.1.8.9_pre1
xinetd xinetd 2.1.8.9_pre2
xinetd xinetd 2.1.8.9_pre3
xinetd xinetd 2.1.8.9_pre4
xinetd xinetd 2.1.8.9_pre5
xinetd xinetd 2.1.8.9_pre7
xinetd xinetd 2.1.8.9_pre8
xinetd xinetd 2.1.8.9_pre9
xinetd xinetd 2.1.8.9_pre10
xinetd xinetd 2.1.8.9_pre11
xinetd xinetd 2.1.8.9_pre12
xinetd xinetd 2.1.8.9_pre13
xinetd xinetd 2.1.8.9_pre14
xinetd xinetd 2.1.8.9_pre15

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C378594-2892-4A0E-807D-D5201E6D465F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.8_pre3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B2FE666-D220-40DB-9CCC-9D5978F077A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD1A836-2393-47A6-A333-F753955CAE45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9F7C502-3D84-43FC-8633-393FA7B34B9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BBBC08F-6400-4EFE-ACA8-906D2DFBFAA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C5181F-9846-4963-B7E0-5F05B4A89E2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre5:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBE2F81B-0F25-49A8-8FFD-A57336BB7AFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre7:*:*:*:*:*:*:*",
              "matchCriteriaId": "B05D59F2-E5C6-4F44-A0F1-DFC721537329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre8:*:*:*:*:*:*:*",
              "matchCriteriaId": "35256395-7F58-49A4-A0BE-B15E91AAE0A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D829D13-3A94-4453-8879-1022D2C9DCEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre10:*:*:*:*:*:*:*",
              "matchCriteriaId": "1701D2B9-C710-4DA8-B495-DD06B3832C69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre11:*:*:*:*:*:*:*",
              "matchCriteriaId": "31F86093-41F8-42C5-872A-50F4FB2BF55F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre12:*:*:*:*:*:*:*",
              "matchCriteriaId": "14574242-9C09-4E11-B4AF-18D7BF1860FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFCE997-358F-4ACF-B979-C20826D883C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre14:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA6A1F6C-29CC-453A-9F71-5DA6DD406F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:xinetd:xinetd:2.1.8.9_pre15:*:*:*:*:*:*:*",
              "matchCriteriaId": "20DDE939-F6B8-48A8-BA60-EE381EE0657C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "xinetd 2.1.8 and earlier runs with a default umask of 0, which could allow local users to read or modify files that are created by an application that runs under xinetd but does not set its own safe umask."
    }
  ],
  "id": "CVE-2001-1322",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-07-10T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000404"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2001/dsa-063"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/6657.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-055.php3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.linuxsecurity.com/advisories/other_advisory-1469.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2001-075.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/2826"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-024-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2001/dsa-063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/6657.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-055.php3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.linuxsecurity.com/advisories/other_advisory-1469.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2001-075.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/2826"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…