| VID |
17029 |
| Severity |
40 |
| Port |
111 |
| Protocol |
TCP,UDP |
| Class |
RPC |
| Detailed Description |
The rexd RPC service is running. Some versions of the rexd daemon allow remote attackers to gain unprivileged remote access using 'on' command.
* References: http://www.securityfocus.com/bid/37 http://xforce.iss.net/xforce/xfdb/101 |
| Recommendation |
Disable the 'rexd' rpc service if it's not needed, or use it after asking to the vendor whether not to be vulnerable.
Solaris 10, Solaris 11, Enterprise Linux 6.4, CentOS 6.4, Fedora 19: 1. you become a root, and then stop the service like the following:
# rpcinfo -d [program num] [version num]
2. comment its entry by putting a # at the beginning of the line with 'rexd' in /etc/rpc 3. # pkill -HUP (x)inetd |
| Related URL |
CVE-1999-0627 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|