Linux Multiple statd Packages Remote Format String

This script is Copyright (C) 2000-2016 Tenable Network Security, Inc.

Synopsis :

The remote service is vulnerable to a buffer overflow.

Description :

The remote statd service could be brought down with a format string
attack - it now needs to be restarted manually.

This means that an attacker may execute arbitrary code thanks to a bug
in this daemon.

See also :

Solution :

Upgrade to the latest version of rpc.statd.

Risk factor :

Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true

Family: RPC

Nessus Plugin ID: 10544 ()

Bugtraq ID: 1480

CVE ID: CVE-2000-0666

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now