[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [cobalt-users] Possible Vulnerability
- Subject: Re: [cobalt-users] Possible Vulnerability
- From: Mike Vanecek <nospam99@xxxxxxxxxxxx>
- Date: Thu Jan 25 06:53:05 2001
- Organization: anonymous
- List-id: Mailing list for users to share thoughts on Cobalt products. <cobalt-users.list.cobalt.com>
On Thu, 25 Jan 2001 09:13:33 -0500, "Larry M. McConnell"
<McConnellLM@xxxxxxxxxxx> wrote:
:>Hello Cobalt List ~
:>
:>Does anyone know if the Qube 2 has this vulnerability?
:>
:>The Ramen worm exploits the RPC.statd and wu-FTP flaws in versions 6.2
:>and 7.0 of Red Hat's Linux. The worm consumes large amounts of
:>bandwidth while scanning for vulnerable servers. Users can download
:>patches for the security holes from Red Hat's web site.
Qube2's do not run either program although RPC is available. It has been a
while, but I went through my Qube2 and disabled the RPC process - don't
remember exactly how though. The consensus is that the Qube2 should not be at
risk from the Ramen worm. However, the price of freedom is eternal vigilance.