Mailinglist Archive: opensuse-security (601 mails)

< Previous Next >
Re: [suse-security] rpc.statd exploit
  • From: Roman Drahtmueller <draht@xxxxxxx>
  • Date: Wed, 9 Aug 2000 12:06:20 +0200 (MEST)
  • Message-id: <Pine.LNX.4.21.0008091204020.1283-100000@xxxxxxxxxxxx>
> > Is SuSE (6.3) vulnerable to the recently published rpc.statd exploit?
> > If so, how can I secure my system short-term? I kind of need NFS...
>
> the fix will be released tomorrow.
>
> Bye,
> Thomas

Ack.

in the meanwhile, switch to unfsd.

1) rcnfsserver stop
2) set USE_KERNEL_NFSD_NUMBER="no" in /etc/rc.config
3) rcnfsserver start
4) reboot the clients because your mounts are stale.

Regards,
Roman Drahtmüller.
--
- -
| Roman Drahtmüller <draht@xxxxxxx> "Caution: Cape does not |
SuSE GmbH - Security enable user to fly."
| Nürnberg, Germany (Batman Costume warning label) |
- -


< Previous Next >
References