Korean
<< Back
VID 14014
Severity 40
Port 513
Protocol TCP
Class R-Command
Detailed Description A vulnerability in the rlogin daemon of some AIX and Linux systems could allow a remote attacker to gain unauthorized root access to the system. A remote attacker can specify the -froot option to rlogin to cause the server daemon to immediately drop the user into a root shell. This problem is a result of incorrectly parsing ths parameters passed to the '/bin/login' program, which results in the attacker logging in as root user without being prompted for a password.

Vulnerable Systems:
AIX 3.x
Linux kernel 2.1.x

* References:
http://www.securityfocus.com/bid/458
http://www.iss.net/security_center/static/104.php
Recommendation For IBM AIX 3:
Apply the APAR IX44254 patch, as listed in CERT Advisory CA-1994-09, http://www.cert.org/advisories/CA-1994-09.html

As a workaround, disable rlogin in the /etc/inetd.conf file and restart the inetd process.
Related URL CVE-1999-0113 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)