statd in nfs-utils 1.257 and earlier does not ignore the SIGPIPE signal, which allows remote attackers to cause a denial of service (server process crash) via a TCP connection that is prematurely terminated.
https://www.ubuntu.com/usn/usn-36-1/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10899
https://exchange.xforce.ibmcloud.com/vulnerabilities/18332
http://www.trustix.org/errata/2004/0065/
http://www.securityfocus.com/bid/11785
http://www.securityfocus.com/archive/1/426072/30/6740/threaded
http://www.redhat.com/support/errata/RHSA-2005-014.html
http://www.redhat.com/support/errata/RHSA-2004-583.html
http://www.debian.org/security/2004/dsa-606
http://cvs.sourceforge.net/viewcvs.py/nfs/nfs-utils/ChangeLog?rev=1.258&view=markup