Brief description: the rexec (8) service is running
Full description: The rexecd daemon authenticates by using cleartext login names and passwords. As the passwords are reusable, its use leaves the system open to attack when passwords are sniffed or otherwise obtained.
Components: rexecd
Systems: any system running an rexec daemon
Effect(s) of exploiting: Anyone who knows a user's password, or can get it, can connect.
Detecting the hole:
Fixing the hole:
Other information:
rexec authentication server
PA Classification(s):
RISOS Classification(s):
DCS Classification(s):
CVE Number: CAN-1999-0618 -- The rexec service is running.
Attack: Guess a password and try it. If it fails, try another.
Advisories: ISS X-Force security advisory Short-Term High-Risk Vulnerability During Slackware 3.6 Network Installations gives an example of a problem with rexec .
Related Vulnerabilities: none yet
Reporting: ()
Other information: