This script detects the running 'rpc.cmsd' service on the host.
Successful exploitation could allow attackers to execute arbitrary code with the privileges of the rpc.cmsd daemon, typically root. With some configurations rpc.cmsd runs with an effective userid of daemon, while retaining root privileges. Impact Level: System
HEWLETT-PACKARD and Sun Microsystems, Inc have released a patch to fix this issue, please refer below link for more information. http://www.securityfocus.com/advisories/1691 http://www.securityfocus.com/advisories/1721 For other distributions please contact your vendor.
The flaw is due to error in the 'rpc.cmsd' service. If this service is running then disable it as it may become a security issue.