| VID |
14019 |
| Severity |
40 |
| Port |
514 |
| Protocol |
TCP |
| Class |
R-Command |
| Detailed Description |
It's possible to run any commands on the relevant system remotely using the 'rsh' service, because there are some problems about surrounding contents of /etc/hosts.equiv file or ~/.rhosts file, or not to set a password.
* References: http://www.iss.net/security_center/static/677.php |
| Recommendation |
1. Disable the rlogin service if it's not needed (comment its entry by putting a # at the beginning of the line and then revoke inetd daemon). *Solaris 10, Solaris 11: # svcadm disable svc:/network/login:rlogin
*Enterprise Linux 6.4, CentOS 6.4, Fedora 19: Open /etc/xinetd.d/rsh and set disable=yes and then restart xinetd
2. Set passwords if it exists accounts with no password. 3. Remove '+' if ~/.rhosts file or /etc/hosts.equiv file has it, and register hostname or IP address explicitly to trust with rsh service. |
| Related URL |
CVE-1999-0651 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|