The description contains a solution that only fixes the problem until the
system is rebooted. I just made it more generic:
--- cachefsd_overflow.nasl Sat Jun 28 12:30:14 2003
+++ /tmp/cachefsd_overflow.nasl Thu Oct 2 10:55:16 2003
@@ -7,7 +7,7 @@
if(description)
{
script_id(10951);
- script_version ("$Revision: 1.9 $");
+ script_version ("$Revision: 1.10 $");
script_bugtraq_id(4631);
script_cve_id("CAN-2002-0084", "CVE-2002-0033");
@@ -26,9 +26,7 @@ systems might be affected as well.
*** Nessus did not check for this vulnerability,
*** so this might be a false positive
-Solution : Deactivate this service (there is no patch at this time) by
typing :
-
- /etc/init.d/cachefs.daemon stop
+Solution : Deactivate this service (there is no patch at this time).
Risk factor : High";
Owen