NetBSD Information for VU#34043
rpc.statd vulnerable to remote root compromise via format string stack overwrite
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 10 Oct 2000
NetBSD 1.4.x and NetBSD 1.5 do not appear to be affected by this problem; all calls to syslog() within rpc.statd take a constant string for the format argument.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.