TUCoPS :: Unix :: General :: rexecd.htm

Denicomp REXECD/RSHD DoS
Vulnerability

    rexecd/rshd

Affected

    Denicomp REXECD/RSHD

Description

    Following  is  based  on   a  Strumpf  Noir  Society   Advisories.
    Denicomp's  REXECD   and  RSHD   products  are   ports  of   their
    counterparts on Unix-based systems,  allowing the use of  the rcp,
    rsh and rexec commands on machines running MS Windows.

    There  exists  a  problem  in  the port-handling code of mentioned
    products which  exposes the  services provided  by these  to a DoS
    attack.

    When a string of +/- 4300  bytes is sent to the listening  port of
    the REXEC and/or RSH daemons  (defaulting to the standard 512  and
    514 ports), the service in question will die.

    A restart will be needed to regain full functionality.

    Vulnerable (tested):

        - Denicomp Winsock RSHD/NT v2.18.00 (Intel)
        - Denicomp Winsock RSHD/NT v2.17.07 (DEC Alpha)
        - Denicomp Winsock REXECD/NT v1.05.00 (Intel)
        - Denicomp Winsock REXECD/NT v1.04.08 (DEC Alpha)
        - Denicomp Winsock RSHD/95 v2.18.03
        - Denicomp Winsock REXECD/95 v1.00.02

    Earlier versions are expected to be vulnerable as well, users  are
    encouraged to upgrade.

Solution

    Vendor  has  been  notified  and  has  verified this problem.  New
    versions  of  these  products  will  be released from the vendor's
    website shortly.

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH