The description contains a solution that only fixes the problem until the
system is rebooted.  I just made it more generic:

--- cachefsd_overflow.nasl      Sat Jun 28 12:30:14 2003
+++ /tmp/cachefsd_overflow.nasl Thu Oct  2 10:55:16 2003
@@ -7,7 +7,7 @@
 if(description)
 {
  script_id(10951);
- script_version ("$Revision: 1.9 $");
+ script_version ("$Revision: 1.10 $");
  script_bugtraq_id(4631);
  script_cve_id("CAN-2002-0084", "CVE-2002-0033");

@@ -26,9 +26,7 @@ systems might be affected as well.
 *** Nessus did not check for this vulnerability,
 *** so this might be a false positive

-Solution : Deactivate this service (there is no patch at this time) by
typing :
-
-            /etc/init.d/cachefs.daemon stop
+Solution : Deactivate this service (there is no patch at this time).

 Risk factor : High";

Owen

Reply via email to