Korean
<< Back
VID 14020
Severity 20
Port 514
Protocol TCP
Class R-Command
Detailed Description The rsh service is running. This service is dangerous in the sense that it is not ciphered - that is, everyone can sniff the data that passes between the rsh client and the rsh server. This includes logins and passwords.
You should disable this service and use ssh instead.

* References:
http://www.iss.net/security_center/static/677.php
Recommendation Disable the 'rexecd' service if it's not needed (comment its entry by putting a # at the beginning of the line and revoke 'inetd' daemon).

Enterprise Linux 6.4, CentOS 6.4, Fedora 19:
Open /etc/xinetd.d/rsh and set disable=yes
and then restart xinetd

Solaris 10, Solaris 11:
#svcadm disable svc:/network/login:rlogin
Related URL CVE-1999-0651 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)