Rexd running |
---|
Risk Level: | High | Check or Attack Name: rexd |
---|---|---|
Platforms: | Unix, Solaris: 2.5.1 | |
Description: | Some versions of the rexd daemon allow remote attackers to gain unprivileged remote access. |
|
Remedy: | Disable the rexd daemon by commenting it out from the inetd.conf file and restarting the inetd process. If rexd services are required for your configuration, apply the patches provided by your vendor. Hewlett-Packard (HP-UX) all versions: Add the -r option to the rpc.rexd entry in the /etc/inetd.conf file. IBM AIX 3.1 and 3.2: Install APAR IX21353 NeXT NeXTstep 2.0 and 2.1: Disable rexd. SGI IRIX 4.x, 5.x, 6.x: Disable rexd. rexd is inappropriate on systems directly exposed to the Internet. |
|
References: | CERT Advisory CA-91.06, NeXT rexd, /private/etc, Username me Vulnerabilities, http://www.cert.org/advisories/CA-91.06.NeXTstep.vulnerability.html CERT Advisory CA-92.05, AIX REXD Daemon Vulnerability, http://www.cert.org/advisories/CA-92.05.AIX.REXD.Daemon.vulnerability.html CIAC Information Bulletin C-21, AIX REXD Daemon Vulnerability, http://ciac.llnl.gov/ciac/bulletins/c-21.shtml |
Know Your Risks |