Looking at the Security focus
page:http://www.securityfocus.com/bid/14088/ , it looks like only
systems running PHP versions up to 4.3.11 are affected. Which should
make testing not affected, as it's at version 4.4.0. But stable would
be because it's still at 4.3.10. Can anyone confirm this?



On 11/8/05, Realos <[EMAIL PROTECTED]> wrote:
>
> > Mike McCarty wanted us to know:
>
> >http://www.securityfocus.com/brief/38?ref=rss
> >
>
> I have rpc.statd and portmap running on my system. Are they vulnerable
> to this security hole/worm?
>
> As I do not use nfs on my debian server, doesn't it make sense to
> disable both portmap and rpc.statd on my system?
>
>
> --
> Realos
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>
>

Reply via email to