Realos wrote:
Mike McCarty wanted us to know:http://www.securityfocus.com/brief/38?ref=rssI have rpc.statd and portmap running on my system. Are they vulnerable to this security hole/worm? As I do not use nfs on my debian server, doesn't it make sense to disable both portmap and rpc.statd on my system?
This has nothing to do with portmap or rpc.statd, they use the old fashioned SysV RPC mechanism. XML-RPC is a very different beast and relies on a web server and, in this case, PHP, to do the remote procedure call.
More info at: http://www.securityfocus.com/bid/14088/ (linked from the above article) HTH, Chris -- Chris Boot bootc@bootc.net http://www.bootc.net/