Brief description: rexd allows commands to be executed remotely with poor or no authentication.
Full description: rexd (8) is an rpc service allowing commands to be executed by a remote client. The rexd protocol does not provide for authentication; hence, all authentication is done in the client. An attacker can simply write their own client, and can then execute commands on the target with the priviledges of any non-root uid they wish.
Components: inetd inetd.conf rpc.rexd
Systems: Any version of the UNIX system running rexd
Effect(s) of exploiting: The attacker gains access to the system with the privileges of the rexd daemon.
Detecting the hole:
Fixing the hole:
Other information:
remote execution, authentication
PA Classification(s):
RISOS Classification(s):
DCS Classification(s):
CVE Number: CVE-1999-0627 -- The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
Attack:
Advisories: Security Focus database entry 37 CERT Advisory CA-92.05: AIX REXD Daemon Vulnerability
Related Vulnerabilities:
Reporting: in ( )