BSDI Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

No versions of BSD/OS are vulnerable.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Caldera Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

Not vulnerable: None of our products ship with rpc.statd

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Compaq Computer Corporation Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

© Copyright 2000 Compaq Computer Corporation. All rights reserved. SOURCE: Compaq Computer Corporation Compaq Services Software Security Response Team USA re: input validation problem in rpc.statd This reported problem has not been found to affect the as shipped, Compaq Tru64/UNIX Operating Systems Software. - Compaq Computer Corporation

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Debian Unknown

Updated:  October 10, 2000

Status

Unknown

Vendor Statement

http://www.debian.org/security/2000/20000719a

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

FreeBSD Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

FreeBSD is not vulnerable to this problem.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

HP Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

HP is NOT Vulnerable to the rpc.statd issue in CERT Advisory CA-2000-17.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

NetBSD Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

NetBSD 1.4.x and NetBSD 1.5 do not appear to be affected by this problem; all calls to syslog() within rpc.statd take a constant string for the format argument.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

OpenBSD Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

*Linux* systems running the rpc.statd service! This affects noone else!

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

RedHat Unknown

Updated:  October 10, 2000

Status

Unknown

Vendor Statement

http://www.redhat.com/support/errata/RHSA-2000-043-03.html

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

SCO Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

The Santa Cruz Operation has investigated this vulnerability and has determined that NO SCO products are susceptable to it. SCO does not provide the programs in question, and SCO programs that perform the same or similar functionality are not susceptable to this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

SGI Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

IRIX rpc.statd is not vulnerable to this security issue.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

Sun Not Affected

Updated:  October 10, 2000

Status

Not Affected

Vendor Statement

Our rpc.statd is not vulnerable to this buffer overflow.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

View all 12 vendors View less vendors