<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HP Security Bulletin #0168 in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588551#M759355</link>
    <description>Hi Chet,&lt;BR /&gt;&lt;BR /&gt;As suggested your system can be compromised &lt;BR /&gt;by having 'rpc' ports open. If you don't &lt;BR /&gt;require these ports close them off in your&lt;BR /&gt;/etc/inetd.conf file. If you need them &lt;BR /&gt;make sure you install the patch(es) at an&lt;BR /&gt;early convenience and make them a priority&lt;BR /&gt;if your system is exposed to high risk or&lt;BR /&gt;outside of your firewall.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael</description>
    <pubDate>Wed, 03 Oct 2001 04:27:59 GMT</pubDate>
    <dc:creator>Michael Tully</dc:creator>
    <dc:date>2001-10-03T04:27:59Z</dc:date>
    <item>
      <title>HP Security Bulletin #0168</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588549#M759353</link>
      <description>Hey there,&lt;BR /&gt;Does anyone know anything about this bulletin referring to RPC processes?? Your help is much appreciated.&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;Chet</description>
      <pubDate>Tue, 02 Oct 2001 17:35:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588549#M759353</guid>
      <dc:creator>Chet Woods</dc:creator>
      <dc:date>2001-10-02T17:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: HP Security Bulletin #0168</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588550#M759354</link>
      <description>Invariably these are buffer overflow errors, or some other "bug" that allows the compromise of your servers.  If you're in an at-risk environment (Internet or equivalent), I'd put the rpc patches high on your list.</description>
      <pubDate>Tue, 02 Oct 2001 21:18:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588550#M759354</guid>
      <dc:creator>Christopher Caldwell</dc:creator>
      <dc:date>2001-10-02T21:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: HP Security Bulletin #0168</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588551#M759355</link>
      <description>Hi Chet,&lt;BR /&gt;&lt;BR /&gt;As suggested your system can be compromised &lt;BR /&gt;by having 'rpc' ports open. If you don't &lt;BR /&gt;require these ports close them off in your&lt;BR /&gt;/etc/inetd.conf file. If you need them &lt;BR /&gt;make sure you install the patch(es) at an&lt;BR /&gt;early convenience and make them a priority&lt;BR /&gt;if your system is exposed to high risk or&lt;BR /&gt;outside of your firewall.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael</description>
      <pubDate>Wed, 03 Oct 2001 04:27:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/hp-security-bulletin-0168/m-p/2588551#M759355</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-10-03T04:27:59Z</dc:date>
    </item>
  </channel>
</rss>

