Korean
<< Back
VID 14013
Severity 20
Port 512
Protocol TCP
Class R-Command
Detailed Description The rexecd service is open.
Because rexecd does not provide any good means of authentification, it can be used by crackers to scan a third party
host, giving you troubles or bypassing your firewall.

* References:
http://www.iss.net/security_center/static/675.php
Recommendation Disable the 'rexecd' service if it's not needed (Comment out the "exec" line in /etc/inetd.conf and revoke 'inetd' daemon).

Enterprise Linux 6.4, CentOS 6.4:
Open etc/xinetd.d/rexec and set disable=yes
and then Restart inetd.

Solaris 10, 11
# svcadm disable svc:/network/rexec:default
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)