| VID |
14020 |
| Severity |
20 |
| Port |
514 |
| Protocol |
TCP |
| Class |
R-Command |
| Detailed Description |
The rsh service is running. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the rsh client and the rsh server. This includes logins and passwords. You should disable this service and use ssh instead.
* References: http://www.iss.net/security_center/static/677.php |
| Recommendation |
Disable the 'rexecd' service if it's not needed (comment its entry by putting a # at the beginning of the line and revoke 'inetd' daemon).
Enterprise Linux 6.4, CentOS 6.4, Fedora 19: Open /etc/xinetd.d/rsh and set disable=yes and then restart xinetd
Solaris 10, Solaris 11: #svcadm disable svc:/network/login:rlogin |
| Related URL |
CVE-1999-0651 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|