Korean
<< Back
VID 17011
Severity 20
Port 111
Protocol TCP,UDP
Class RPC
Detailed Description The nfsd RPC service is running. Security of NFS relies heavily upon who is allowed to mount the volumes that a server exports, and whether or not they are exported read-only. Improperly configured access permissions on exported volumes can permit an attacker to gain access to critical files.
and there is a bug in older versions of this service that allow an intruder to execute arbitrary commands on your system.

* References:
http://www.iss.net/security_center/static/76.php
Recommendation Disable the 'nfsd' rpc service if it's not needed, or use it after asking to the vendor whether not to be vulnerable.

Solaris 10, Solaris 11, Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
1. you become a root, and then stop the service like the following:

# rpcinfo -d [program num] [version num]

2. comment its entry by putting a # at the beginning of the line with 'nfsd' in /etc/rpc
3. # pkill -HUP (x)inetd
Related URL CVE-1999-0631 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)