Summary
The remote host is missing an update to nfs-utils
announced via advisory DSA 606-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20606-1
Insight
SGI has discovered that rpc.statd from the nfs-utils package, the Network Status Monitor, did not ignore the SIGPIPE. Hence, a client prematurely terminating the TCP connection could also terminate the server process.
For the stable distribution (woody) this problem has been fixed in version 1.0-2woody2.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your nfs-utils package.
Severity
Classification
-
CVE CVE-2004-1014 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities