Updated: October 10, 2000
Not Affected
No versions of BSD/OS are vulnerable.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
Not vulnerable: None of our products ship with rpc.statd
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
© Copyright 2000 Compaq Computer Corporation. All rights reserved. SOURCE: Compaq Computer Corporation Compaq Services Software Security Response Team USA re: input validation problem in rpc.statd This reported problem has not been found to affect the as shipped, Compaq Tru64/UNIX Operating Systems Software. - Compaq Computer Corporation
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Unknown
http://www.debian.org/security/2000/20000719a
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
FreeBSD is not vulnerable to this problem.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
HP is NOT Vulnerable to the rpc.statd issue in CERT Advisory CA-2000-17.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
NetBSD 1.4.x and NetBSD 1.5 do not appear to be affected by this problem; all calls to syslog() within rpc.statd take a constant string for the format argument.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
*Linux* systems running the rpc.statd service! This affects noone else!
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Unknown
http://www.redhat.com/support/errata/RHSA-2000-043-03.html
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
The Santa Cruz Operation has investigated this vulnerability and has determined that NO SCO products are susceptable to it. SCO does not provide the programs in question, and SCO programs that perform the same or similar functionality are not susceptable to this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
IRIX rpc.statd is not vulnerable to this security issue.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
Updated: October 10, 2000
Not Affected
Our rpc.statd is not vulnerable to this buffer overflow.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.