Korean
<< Back
VID 14019
Severity 40
Port 514
Protocol TCP
Class R-Command
Detailed Description It's possible to run any commands on the relevant system remotely using the 'rsh' service, because there are some problems about surrounding contents of /etc/hosts.equiv file or ~/.rhosts file, or not to set a password.

* References:
http://www.iss.net/security_center/static/677.php
Recommendation 1. Disable the rlogin service if it's not needed (comment its entry by putting a # at the beginning of the line and then revoke inetd daemon).
*Solaris 10, Solaris 11:
# svcadm disable svc:/network/login:rlogin

*Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/rsh and set disable=yes
and then restart xinetd

2. Set passwords if it exists accounts with no password.
3. Remove '+' if ~/.rhosts file or /etc/hosts.equiv file has it, and register hostname or IP address explicitly to trust with rsh service.
Related URL CVE-1999-0651 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)