Rsh null vulnerable

Risk Level: High risk vulnerability  High

Check or Attack Name: rshnull

Platforms: Unix
Description:

Older versions of the in.rshd daemon allowed users to log in as user NULL that, because of a flaw within the rusersok() function call, would grant access without proper authorization.

Remedy:

Disable the RSH service by commenting it out of the inetd.conf file and restarting the inetd process. If your configuration requires the use of RSH facilities, you should contact your vendor for patch information or install a RSH from a third party package.

References:

X-Force Logo
Know Your Risks