| VID |
17057 |
| Severity |
40 |
| Port |
111 |
| Protocol |
TCP,UDP |
| Class |
RPC |
| Detailed Description |
The NIS YP service is running. Unpatched versions allow attackers to capture the password file. or may be compromised by a buffer overflow. |
| Recommendation |
Disable the 'ypserv' rpc service if it's not needed, or use it after asking to the vendor whether not to be vulnerable. To disable 'ypserv' service, first, you become a root, and then stop the service like the following:
# rpcinfo -d [program num] [version num]
And comment its entry by putting a # at the beginning of the line and revoke 'inetd' daemon.
Solaris 10, Solaris 11, Enterprise Linux 6.4, CentOS 6.4, Fedora 19: 1. you become a root, and then stop the service like the following:
# rpcinfo -d [program num] [version num]
2. comment its entry by putting a # at the beginning of the line with 'ypserv' in /etc/rpc 3. # pkill -HUP (x)inetd |
| Related URL |
CVE-1999-0902 (CVE) |
| Related URL |
753 (SecurityFocus) |
| Related URL |
3381 (ISS) |
|