Vulnerability Name:

CCN-2982

Published:1999-08-05
Updated:1999-08-05
Summary:Daemon binaries for network services are prime targets for hackers to install trojan horse programs that will allow them privileged access to the system. To enable the system to monitor such files for unauthorized changes, they should be included in the System Scanner baseline file.
CVSS v3 Severity:
CVSS v2 Severity:
References:Source: XF
Type: UNKNOWN
inetd-frozen(2982)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:sunos:5.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    hp hp-ux 10.20
    sun solaris 2.5.1
    sun solaris 2.6
    redhat linux 6.0
    sun solaris 8
    ibm aix 4
    hp hp-ux 11
    redhat linux 7
    redhat linux 7.1
    compaq tru64 *
    redhat linux 7.2
    redhat linux 7.3
    sun solaris 7.0