Looking at the Security focus page:http://www.securityfocus.com/bid/14088/ , it looks like only systems running PHP versions up to 4.3.11 are affected. Which should make testing not affected, as it's at version 4.4.0. But stable would be because it's still at 4.3.10. Can anyone confirm this?
On 11/8/05, Realos <[EMAIL PROTECTED]> wrote: > > > Mike McCarty wanted us to know: > > >http://www.securityfocus.com/brief/38?ref=rss > > > > I have rpc.statd and portmap running on my system. Are they vulnerable > to this security hole/worm? > > As I do not use nfs on my debian server, doesn't it make sense to > disable both portmap and rpc.statd on my system? > > > -- > Realos > > > -- > To UNSUBSCRIBE, email to [EMAIL PROTECTED] > with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED] > >