RSHSVC Included in WinNT 3.5x/4.0 ResKit Has Potential LeakLast reviewed: October 22, 1997Article ID: Q158320 |
The information in this article applies to:
SYMPTOMSAlthough the RSHSVC utility included in the Windows NT Server Resource Kit uses the .Rhosts file for the Account Level Equivalence (ALE) security, RSHSVC does not do the ALE security check as is explicitly specified in the Rshsvc.txt or Rshsvc.htm files, therefore it poses a security leak or hole.
MORE INFORMATIONA Remote Shell Server Service (RSH) Daemon normally provides one or two levels of security: the Host Level Equivalence (low/loose), by using the Hosts.equiv file and the Account Level Equivalence (high/tighter), by using the .Rhosts file (The period "." is part of the name!). According to the Rshsvc.txt or Rshsvc.htm file, the Rshsvc.exe file running on an IP host (local computer) provides the ALE security and is supposed to check the user name (either the client user name or server user name) of a user who tries to remotely access from a remote host, and the remote host name against the entries in the .Rhosts file under the %SystemRoot%\System32\Drivers\Etc directory on the local computer. RSHSVC supposedly returns an access denied error message when any of the following conditions occur:
This poses serious security problems such as delete file, kill process, and so forth. * 2. Issue the following command from an authorized remote computer. (But
STATUSMicrosoft has confirmed this to be a problem in NT version 3.5x/4.0 and we are researching this problem and will post new information here in the Microsoft Knowledge Base as it becomes available.
REFERENCE
|
Additional query words: Reskit
© 1998 Microsoft Corporation. All rights reserved. Terms of Use. |