|
Family: Debian Local Security Checks --> Category: infos
[DSA606] DSA-606-1 nfs-utils Vulnerability Scan
Vulnerability Scan Summary DSA-606-1 nfs-utils
Detailed Explanation for this Vulnerability Test
SGI has discovered that rpc.statd from the nfs-utils package, the
Network Status Monitor, did not ignore the "SIGPIPE". Hence, a client
prematurely terminating the TCP connection could also terminate the
server process.
For the stable distribution (woody) this problem has been fixed in
version 1.0-2woody2.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your nfs-utils package.
Solution : http://www.debian.org/security/2004/dsa-606
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|