An overflow vulnerability in the xdrmem_getbytes() function that's part of the XDR RPC library (which is part of glibc) could be exploited to run arbitrary code on the affected machine.
The overflow occurs in the function xdrmem_getbytes() and can be used by external attackers to execute arbitrary code. There is no temporary workaround for this security problem other than disabling all RPC based server and client programs. The permanent solution is to update the glibc packages with the update packages.
For details, see http://lists2.suse.com/archive/suse-security-announce/2003-May/0002.html.