Family: Useless services --> Category: infos
Rsh Server Detection Vulnerability Scan
Vulnerability Scan Summary
Searches for the existence of rsh
Detailed Explanation for this Vulnerability Test
The rsh service is running.
The remote host is running the 'rsh' service. This service is dangerous in
the sense that it is not ciphered - that is, everyone can sniff the data
that passes between the rsh client and the rsh server. This includes logins
Also, it may allow poorly authenticated logins without passwords. If the
host is vulnerable to TCP sequence number guessing (from any network)
or IP spoofing (including ARP hijacking on a local network) then it may
be possible to bypass authentication.
Finally, rsh is an easy way to turn file-write access into full logins
through the .rhosts or rhosts.equiv files.
You should disable this service and use ssh instead.
Comment out the 'rsh' line in /etc/inetd.conf
Low / CVSS Base Score : 2
Click HERE for more information and discussions on this network vulnerability scan.