Realos wrote:
Mike McCarty wanted us to know:


http://www.securityfocus.com/brief/38?ref=rss



I have rpc.statd and portmap running on my system. Are they vulnerable
to this security hole/worm?

As I do not use nfs on my debian server, doesn't it make sense to
disable both portmap and rpc.statd on my system?

This has nothing to do with portmap or rpc.statd, they use the old fashioned SysV RPC mechanism. XML-RPC is a very different beast and relies on a web server and, in this case, PHP, to do the remote procedure call.

More info at:
http://www.securityfocus.com/bid/14088/ (linked from the above article)

HTH,
Chris

--
Chris Boot
[EMAIL PROTECTED]
http://www.bootc.net/


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to