- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Re: rpc.mountd vulnerabilites
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-17-2000 05:48 AM
тАО11-17-2000 05:48 AM
rpc.mountd vulnerabilites
The first is that a user can identify what files are on a system by issueing mount -F
The second is that rpc.mountd does not run on a reserved port so is vulnerable to port hijacking. rpc.mountd ran on a reserved port by default until the latest version of rpc.mountd was released with patch PHNE_19620.
Are there fixes for these problems ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-17-2000 06:11 AM
тАО11-17-2000 06:11 AM
Re: rpc.mountd vulnerabilites
My advise is to install this, if there are genuine security issues still outstanding you would have to get an HP Response Centre to confirm these and gain a fix from the labs.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-17-2000 06:21 AM
тАО11-17-2000 06:21 AM
Re: rpc.mountd vulnerabilites
behavior changed between 10.20 and 11.0 and 11.0 implements the current
standard. Unfortunately, the man page hasn't been updated yet, although there
already is a request into the lab to update it. However, the port rpc.mountd
uses is virtually irrelevant to security. The rpc.mountd -p option deals with
what ports incoming connections can use. Without -p the incoming connection may
be on an unreserved port. rpc.mountd's default is to accept reserved port
connections only. The port it works on, though, is distinct. Because 11.0
conforms with Sun's standard, this behavior will not change unless Sun changes.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-17-2000 06:54 AM
тАО11-17-2000 06:54 AM
Re: rpc.mountd vulnerabilites
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО11-20-2000 01:35 AM
тАО11-20-2000 01:35 AM
Re: rpc.mountd vulnerabilites
11.00 server "clever" PHNE_22125 not installed
# exportfs -ua
# mount clever:/tmp/blubber /mnt
No such file or directory <------------------ This is the bug
# touch /tmp/blubber /mnt
# mount clever:/tmp/blubber /mnt
Permission denied.
Now the same with PHNE_22125
# exportfs -ua
# mount clever:/tmp/blubber /mnt
Permission denied <------------------
# touch /tmp/blubber /mnt
# mount clever:/tmp/blubber /mnt
Permission denied.