Is SuSE (6.3) vulnerable to the recently published rpc.statd exploit? If so, how can I secure my system short-term? I kind of need NFS... Volker
On Wed, 9 Aug 2000, Volker Kuhlmann wrote:
Is SuSE (6.3) vulnerable to the recently published rpc.statd exploit? If so, how can I secure my system short-term? I kind of need NFS...
the fix will be released tomorrow. Bye, Thomas -- Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg E@mail: thomas@suse.de Function: Security Support & Auditing "lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka" Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47
Is SuSE (6.3) vulnerable to the recently published rpc.statd exploit? If so, how can I secure my system short-term? I kind of need NFS...
the fix will be released tomorrow.
Bye, Thomas
Ack. in the meanwhile, switch to unfsd. 1) rcnfsserver stop 2) set USE_KERNEL_NFSD_NUMBER="no" in /etc/rc.config 3) rcnfsserver start 4) reboot the clients because your mounts are stale. Regards, Roman Drahtmüller. -- - - | Roman Drahtmüller <draht@suse.de> "Caution: Cape does not | SuSE GmbH - Security enable user to fly." | Nürnberg, Germany (Batman Costume warning label) | - -
participants (3)
-
Roman Drahtmueller
-
Thomas Biege
-
Volker Kuhlmann