Dat ligt er bijvoorbeeld aan of het waar is of er al dan niet een patch voor is:
IBM:
We have since developed emergency fixes and APAR assignments for AIX 4.3 and 5.1 to eliminate the vulnerability (once and for all!).
* For AIX 4.3, the APAR is IY25436
* For AIX 5.1, the APAR is IY25437
To receive the emergency fix, AIX SupportLine customers can call 1-800-CALL-AIX.
The emergency fix ("CDE_dtspcd_efix.tar.Z") is posted for customer download at:
ftp://aix.software.ibm.com/aix/efixes/security/
SGI:
SGI acknowledges that it may not always be possible to immediately install patches or upgrade the operating system. In those cases, we recommend removing the suid bit from the relevant binaries until the patch can beapplied. This will result in reduced functionality of the system, and will not completely secure the system from these vulnerabilities.
If you want to do this, please follow this procedure:
% su - root
# cd /usr/dt/bin
# chmod 755 dtaction
# chmod 755 dtprintinfo
# chmod 755 dtsession
# chmod 755 dtterm
# chmod 755 rpc.ttdbserverd
# exit
Sun:
Sun announces the release of patches for Solaris(tm) 8, 7, 2.6, and 2.5.1 (SunOS(tm) 5.8, 5.7, 5.6, and 5.5.1) which relate to a buffer overflow in dtspcd.
Sun recommends that you install the patches listed in section 4 immediately on systems running the CDE Subprocess control service, dtspcd, on SunOS 5.8, 5.7, 5.6, and 5.5.1.
A. Patches listed in this bulletin are available to all Sun customers at:
http://sunsolve.sun.com/securitypatch
enkel zijn de producten van Data General en TriTeal nog niet volledig getest en geen patches aanwezig
alle fabrikanten hebben hun patch rond half november uitgebracht dus je mag concluderen dat degenen die deze bug meldden heel duidelijk van tevoren gemeld hebben dat de bug bestond aan de fabrikanten (en de clou van dit verhaal, nooit zomaar geloven wat je ergens leest,
zélfs al is het Tweakers.net)