<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerability in rpc.statd in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-statd/m-p/2442447#M759657</link>
    <description>CERT indicates a vulnerability in the rpc.statd program (CERT Advisory CA-2000-17).&lt;BR /&gt;&lt;BR /&gt;I would like to know whether HP-UX 10.20 and 11.00 are affected or not.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Mon, 04 Sep 2000 13:46:36 GMT</pubDate>
    <dc:creator>Olivier Hubert</dc:creator>
    <dc:date>2000-09-04T13:46:36Z</dc:date>
    <item>
      <title>Vulnerability in rpc.statd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-statd/m-p/2442447#M759657</link>
      <description>CERT indicates a vulnerability in the rpc.statd program (CERT Advisory CA-2000-17).&lt;BR /&gt;&lt;BR /&gt;I would like to know whether HP-UX 10.20 and 11.00 are affected or not.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 04 Sep 2000 13:46:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-statd/m-p/2442447#M759657</guid>
      <dc:creator>Olivier Hubert</dc:creator>
      <dc:date>2000-09-04T13:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability in rpc.statd</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-statd/m-p/2442448#M759658</link>
      <description>Extracted from the document you quoted :&lt;BR /&gt;   .....&lt;A href="http://www.cert.org/advisories/CA-2000-17.html" target="_blank"&gt;http://www.cert.org/advisories/CA-2000-17.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;CERT? Advisory CA-2000-17&lt;BR /&gt;                     Input Validation Problem in rpc.statd&lt;BR /&gt;&lt;BR /&gt;                     Original release date: August 18, 2000&lt;BR /&gt;                     Last revised: August 23, 2000&lt;BR /&gt;                     Source: CERT/CC&lt;BR /&gt;&lt;BR /&gt;                     A complete revision history is at the end of this file. &lt;BR /&gt;&lt;BR /&gt;Appendix A. Vendor Information&lt;BR /&gt;&lt;BR /&gt;                     This section contains information provided by vendors for this advisory. We will update this appendix as we receive more information. If you do not see your vendor's name, the CERT/CC did not receive a response from that vendor.&lt;BR /&gt;Please contact your vendor directly.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Hewlett-Packard Company&lt;BR /&gt;HP is NOT Vulnerable to the rpc.statd issue in CERT Advisory CA-2000-17.</description>
      <pubDate>Mon, 04 Sep 2000 13:55:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vulnerability-in-rpc-statd/m-p/2442448#M759658</guid>
      <dc:creator>Alex Glennie</dc:creator>
      <dc:date>2000-09-04T13:55:30Z</dc:date>
    </item>
  </channel>
</rss>

