[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] Alert: rpc.statd remote root exploit



Synopsis
========
rpc.statd allows remote root exploit.

Problem Description
===================
A remote root exploit was published today for rpc.statd.
All machines that run rpc.statd must be upgraded immediately.
This is not a new bug, if you have upgraded rpc.statd recently
as mentioned in the initial advisory (for RedHat that means
upgrading to nfs-utils-0.1.9.1-1.i386.rpm) you are not 
vulnerable.

Affected Systems
================
Almost certainly all Linux distributions that have not been upgraded
recently. RH 7.0 is not affected.

Workaround
==========
If you do not mount and/or export NFS filesystems you shoud not run
rpc.statd at all. Stop the daemon:

cd /etc/rc.d/init.d
./nfslock stop
mv ../rc5.d/S14nfslock ../rc5.d/K14nfslock
mv ../rc3.d/S14nfslock ../rc3.d/K14nfslock

(this applies to RedHat; if you use a different distribution, you
may have to replace the file name "nfslock" by something else)

Solution
========
Upgrade to the newer packages for your distribution.

RedHat 6.x
rpm -Uvh nfs-utils-0.1.9.1-1.i386.rpm