<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CDE rpc.cmsd server and exploitable buffer overflow in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455473#M12359</link>
    <description>Hi,&lt;BR /&gt;&lt;BR /&gt;csmd is started from inetd.&lt;BR /&gt;If you're not using the calendar comment the cmsd line in /etc/inetd.conf&lt;BR /&gt;&lt;BR /&gt;Regards</description>
    <pubDate>Thu, 19 Oct 2000 11:12:12 GMT</pubDate>
    <dc:creator>Andreas Voss</dc:creator>
    <dc:date>2000-10-19T11:12:12Z</dc:date>
    <item>
      <title>CDE rpc.cmsd server and exploitable buffer overflow</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455472#M12358</link>
      <description>During a security scan of my servers the following error was reported:  &lt;BR /&gt;"CDE rpc.cmsd server contains a remotely exploitable buffer overflow."  &lt;BR /&gt;&lt;BR /&gt;The description was that "a remotely exploitable buffer overflow in the CDE database manager rpc.cmsd could allow a remote attacker to gain root privileges on vulnerable machines. The Calendar Manager Service daemon is used as an appointment and resource-scheduler with clients such as Calendar Manager in Openwindows, and Calendar in CDE."&lt;BR /&gt;&lt;BR /&gt;I loaded the CDE Runtime Sep2000 patch and its dependencies to try to correct the problem, but the scan is still reporting this vulnerability.  &lt;BR /&gt;&lt;BR /&gt;Any suggestions? TIA&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Oct 2000 11:02:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455472#M12358</guid>
      <dc:creator>Debra L. Benavidez</dc:creator>
      <dc:date>2000-10-19T11:02:44Z</dc:date>
    </item>
    <item>
      <title>Re: CDE rpc.cmsd server and exploitable buffer overflow</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455473#M12359</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;csmd is started from inetd.&lt;BR /&gt;If you're not using the calendar comment the cmsd line in /etc/inetd.conf&lt;BR /&gt;&lt;BR /&gt;Regards</description>
      <pubDate>Thu, 19 Oct 2000 11:12:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455473#M12359</guid>
      <dc:creator>Andreas Voss</dc:creator>
      <dc:date>2000-10-19T11:12:12Z</dc:date>
    </item>
    <item>
      <title>Re: CDE rpc.cmsd server and exploitable buffer overflow</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455474#M12360</link>
      <description>I'm not so sure of this approach, I had a customer only last week had this done ... amongst other things I may add, the result was all users were unable to login. In his case though users home directories were nfs mounted.&lt;BR /&gt;&lt;BR /&gt;Give it a go, if you encounter problems you will know why at least. I see if I can find an official answer.</description>
      <pubDate>Thu, 19 Oct 2000 11:36:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455474#M12360</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-10-19T11:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: CDE rpc.cmsd server and exploitable buffer overflow</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455475#M12361</link>
      <description />
      <pubDate>Thu, 19 Oct 2000 11:41:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455475#M12361</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-10-19T11:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: CDE rpc.cmsd server and exploitable buffer overflow</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455476#M12362</link>
      <description>Thank you for your responses!  I commented out the cmsd entry in the /etc/inetd.conf, rebooted the servers, and ensured the users could sign on.  The vulnerability scan was run and reported no errors.  Thank you!!!</description>
      <pubDate>Thu, 19 Oct 2000 17:27:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cde-rpc-cmsd-server-and-exploitable-buffer-overflow/m-p/2455476#M12362</guid>
      <dc:creator>Debra L. Benavidez</dc:creator>
      <dc:date>2000-10-19T17:27:42Z</dc:date>
    </item>
  </channel>
</rss>

