The host is running statd service and is prone to multiple remote format string vulnerabilities.
Successful exploitation could allow attackers to execute arbitrary code with the privileges of the rpc.statd process, typically root. Impact Level: System/Application
Upgrade to latest of nfs-utils version 0.1.9.1 or later, For updates refer to http://sourceforge.net/projects/nfs/files/nfs-utils/
The flaws are due to errors in rpc.statd/kstatd daemons logging system. A call to syslog in the program takes data directly from the remote user, this data could include printf-style format specifiers.