Korean
<< Back
VID 17055
Severity 40
Port 111
Protocol TCP,UDP
Class RPC
Detailed Description The ypupdated RPC service is running. Some implementation of this daemon allow a remote user to execute arbitrary shell commands as root.
Recommendation Disable the 'ypupdated' rpc service if it's not needed, or use it after asking to the vendor whether not to be vulnerable.

Solaris 10, Solaris 11, Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
1. you become a root, and then stop the service like the following:

# rpcinfo -d [program num] [version num]

2. comment its entry by putting a # at the beginning of the line with 'ypupdated' in /etc/rpc
3. # pkill -HUP (x)inetd
Related URL CVE-1999-0208 (CVE)
Related URL 1749 (SecurityFocus)
Related URL 110 (ISS)