<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability in rpc.ttbdserverd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615865#M755929</link>
    <description>Here is a great security doc, BTW all rpc services are security risks:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry&lt;BR /&gt;</description>
    <pubDate>Fri, 16 Nov 2001 20:27:20 GMT</pubDate>
    <dc:creator>harry d brown jr</dc:creator>
    <dc:date>2001-11-16T20:27:20Z</dc:date>
    <item>
      <title>Vulnerability in rpc.ttbdserverd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615862#M755926</link>
      <description>I have checked my server and find that rpc.ttbdserverd isn't in /etc/inetd.conf. Can I assume that my systems aren't vulnerable to the security breach?&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Fri, 16 Nov 2001 19:54:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615862#M755926</guid>
      <dc:creator>Douglas Arneson</dc:creator>
      <dc:date>2001-11-16T19:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in rpc.ttbdserverd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615863#M755927</link>
      <description>Douglas,&lt;BR /&gt;That just means that it will not get spawned by inetd. If someone happens to start it by command line you would be vulnerable.  Check to see if it is installed on your box, then an only then could you really say your not vulnerable.&lt;BR /&gt;&lt;BR /&gt;Good Luck,&lt;BR /&gt;C</description>
      <pubDate>Fri, 16 Nov 2001 19:57:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615863#M755927</guid>
      <dc:creator>Craig Rants</dc:creator>
      <dc:date>2001-11-16T19:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in rpc.ttbdserverd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615864#M755928</link>
      <description />
      <pubDate>Fri, 16 Nov 2001 20:06:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615864#M755928</guid>
      <dc:creator>John Bolene</dc:creator>
      <dc:date>2001-11-16T20:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in rpc.ttbdserverd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615865#M755929</link>
      <description>Here is a great security doc, BTW all rpc services are security risks:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://people.hp.se/stevesk/bastion.html" target="_blank"&gt;http://people.hp.se/stevesk/bastion.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;live free or die&lt;BR /&gt;harry&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2001 20:27:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-ttbdserverd/m-p/2615865#M755929</guid>
      <dc:creator>harry d brown jr</dc:creator>
      <dc:date>2001-11-16T20:27:20Z</dc:date>
    </item>
  </channel>
</rss>

