Mailinglist Archive: opensuse-security (601 mails)

< Previous Next >
Re: [suse-security] rpc.statd exploit
  • From: Thomas Biege <thomas@xxxxxxx>
  • Date: Wed, 9 Aug 2000 07:32:26 +0200 (CEST)
  • Message-id: <Pine.LNX.4.21.0008090732051.16768-100000@xxxxxxxxxxxxxx>
On Wed, 9 Aug 2000, Volker Kuhlmann wrote:

> Is SuSE (6.3) vulnerable to the recently published rpc.statd exploit?
> If so, how can I secure my system short-term? I kind of need NFS...

the fix will be released tomorrow.

Bye,
Thomas
--
Thomas Biege, SuSE GmbH, Schanzaeckerstr. 10, 90443 Nuernberg
E@mail: thomas@xxxxxxx Function: Security Support & Auditing
"lynx -source http://www.suse.de/~thomas/thomas.pgp | pgp -fka"
Key fingerprint = 09 48 F2 FD 81 F7 E7 98 6D C7 36 F1 96 6A 12 47


< Previous Next >
Follow Ups
References