Code [inet001e]
an incorrect configuration, or that a port to this machine has not
Code [inet001e]
an incorrect configuration, or that a port to this machine has not
Code [inet001e]
files are required for the checks to proceed. This either indicates
files are required for the checks to proceed. This either indicates
Code [inet001e]
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
Code [inet001e]
Code [inet001e]
One or the other of the two listed files are unavailable. These
Code [inet001e]
Code [inet001e]
Code [inet001e]
an incorrect configuration, or that a port to this machine has not
Code [inet001e]
Code [inet001e]
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
been completed.
been completed.
One or the other of the two listed files are unavailable. These
been completed.
Code [inet001e]
One or the other of the two listed files are unavailable. These
an incorrect configuration, or that a port to this machine has not
Code [inet001e]
One or the other of the two listed files are unavailable. These
One or the other of the two listed files are unavailable. These
been completed.
been completed.
an incorrect configuration, or that a port to this machine has not
been completed.
Code [inet001e]
Code [inet001e]
Code [inet001e]
One or the other of the two listed files are unavailable. These
Code [inet002f]
One or the other of the two listed files are unavailable. These
Code [inet002f]
files are required for the checks to proceed. This either indicates
One or the other of the two listed files are unavailable. These
Code [inet001e]
One or the other of the two listed files are unavailable. These
One or the other of the two listed files are unavailable. These
One or the other of the two listed files are unavailable. These
One or the other of the two listed files are unavailable. These
been completed.
been completed.
been completed.
Code [inet001e]
Code [inet001e]
files are required for the checks to proceed. This either indicates
Code [inet001e]
files are required for the checks to proceed. This either indicates
files are required for the checks to proceed. This either indicates
One or the other of the two listed files are unavailable. These
an incorrect configuration, or that a port to this machine has not
files are required for the checks to proceed. This either indicates
files are required for the checks to proceed. This either indicates
Code [inet002f]
files are required for the checks to proceed. This either indicates
Code [inet002f]
Code [inet002f]
One or the other of the two listed files are unavailable. These
Code [inet002f]
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
One or the other of the two listed files are unavailable. These
files are required for the checks to proceed. This either indicates
Code [inet002f]
files are required for the checks to proceed. This either indicates
Code [inet002f]
Code [inet002f]
an incorrect configuration, or that a port to this machine has not
The indicated service is assigned to the wrong port. This indicates
an incorrect configuration, or that a port to this machine has not
Code [inet002f]
Code [inet002f]
an incorrect configuration, or that a port to this machine has not
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
an incorrect configuration, or that a port to this machine has not
Code [inet002f]
been completed.
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
The indicated service is assigned to the wrong port. This indicates
files are required for the checks to proceed. This either indicates
been completed.
Code [inet002f]
Code [inet002f]
The indicated service is assigned to the wrong port. This indicates
an incorrect configuration, or that a port to this machine has not
been completed.
an incorrect configuration, or that a port to this machine has not
The indicated service is assigned to the wrong port. This indicates
been completed.
been completed.
sign of an intrusion. This should be checked and corrected. If it
an incorrect configuration, or that a port to this machine has not
been completed.
sign of an intrusion. This should be checked and corrected. If it
been completed.
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
Code [inet002f]
is not apparent why it is like this, the system should be checked
Code [inet002f]
Code [inet002f]
either a misconfiguration in the services database, or a possible
been completed.
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
Code [inet002f]
Code [inet002f]
Code [inet002f]
sign of an intrusion. This should be checked and corrected. If it
Code [inet002f]
for other signs of intrusion.
The indicated service is assigned to the wrong port. This indicates
for other signs of intrusion.
Code [inet002f]
been completed.
Code [inet002f]
Code [inet002f]
sign of an intrusion. This should be checked and corrected. If it
Code [inet002f]
Code [inet002f]
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
The indicated service is assigned to the wrong port. This indicates
Code [inet002f]
is not apparent why it is like this, the system should be checked
The indicated service is assigned to the wrong port. This indicates
Code [inet002f]
is not apparent why it is like this, the system should be checked
The indicated service is assigned to the wrong port. This indicates
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
The indicated service is assigned to the wrong port. This indicates
sign of an intrusion. This should be checked and corrected. If it
Code [inet002f]
Code [inet002f]
is not apparent why it is like this, the system should be checked
Code [inet002f]
Code [inet002f]
The indicated service is assigned to the wrong port. This indicates
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
The indicated service is assigned to the wrong port. This indicates
is not apparent why it is like this, the system should be checked
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
Code [inet002f]
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
is not apparent why it is like this, the system should be checked
The indicated service is assigned to the wrong port. This indicates
either a misconfiguration in the services database, or a possible
for other signs of intrusion.
for other signs of intrusion.
Code [inet002f]
is not apparent why it is like this, the system should be checked
is not apparent why it is like this, the system should be checked
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
Code [inet003w]
Code [inet002f]
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
Code [inet003w]
The indicated service is assigned to the wrong port. This indicates
sign of an intrusion. This should be checked and corrected. If it
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
for other signs of intrusion.
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
Code [inet003w]
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
Code [inet003w]
Code [inet003w]
either a misconfiguration in the services database, or a possible
is not apparent why it is like this, the system should be checked
Code [inet003w]
Code [inet003w] Code [inet003w]
Code [inet003w]
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
Code [inet003w]
The indicated port number is assigned to another service. This
is not apparent why it is like this, the system should be checked
The indicated port number is assigned to another service. This
Code [inet003w]
is not apparent why it is like this, the system should be checked
The indicated port number is assigned to another service. This
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
The indicated port number is assigned to another service. This
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
sign of an intrusion. This should be checked and corrected. If it
for other signs of intrusion.
Code [inet003w]
Code [inet003w]
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
The indicated port number is assigned to another service. This
possible sign of an intrusion. This should be checked and corrected.
Code [inet003w]
Code [inet003w]
Code [inet003w]
Code [inet003w]
Code [inet003w]
possible sign of an intrusion. This should be checked and corrected.
Code [inet003w]
Code [inet003w]
Code [inet003w]
The indicated port number is assigned to another service. This
possible sign of an intrusion. This should be checked and corrected.
for other signs of intrusion.
for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
Code [inet003w]
Code [inet003w]
Code [inet003w]
Code [inet003w]
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
Code [inet003w]
Code [inet003w]
Code [inet003w]
The indicated port number is assigned to another service. This
The indicated port number is assigned to another service. This
If it is not apparent why it is like this, the system should be
Code [inet003w]
Code [inet003w]
If it is not apparent why it is like this, the system should be
The indicated port number is assigned to another service. This
If it is not apparent why it is like this, the system should be
The indicated port number is assigned to another service. This
Code [inet003w]
The indicated port number is assigned to another service. This
Code [inet003w]
The indicated port number is assigned to another service. This
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
Code [inet004i]
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
indicates either a misconfiguration in the services database, or a
Code [inet004i]
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
indicates either a misconfiguration in the services database, or a
The indicated port number is assigned to another service. This
If it is not apparent why it is like this, the system should be
The indicated port number is assigned to another service. This
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
indicates either a misconfiguration in the services database, or a
possible sign of an intrusion. This should be checked and corrected.
The indicated port number is assigned to another service. This
Code [inet003w]
Code [inet003w]
checked for other signs of intrusion.
checked for other signs of intrusion.
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
The indicated port number is assigned to another service. This
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
Code [inet004i]
Code [inet004i]
as distributed. These are normal output, but you should be
If it is not apparent why it is like this, the system should be
Code [inet004i]
Code [inet004i]
If it is not apparent why it is like this, the system should be
Code [inet004i]
Code [inet004i]
If it is not apparent why it is like this, the system should be
Code [inet004i]
checked for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
possible sign of an intrusion. This should be checked and corrected.
Code [inet004i]
Code [inet004i]
If it is not apparent why it is like this, the system should be
The indicated service has been added to the services database
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
possible sign of an intrusion. This should be checked and corrected.
checked for other signs of intrusion.
Code [inet004i]
If it is not apparent why it is like this, the system should be
familiar with what is there, and note any changes.
Code [inet004i]
The indicated service has been added to the services database
checked for other signs of intrusion.
The indicated service has been added to the services database
Code [inet004i]
The indicated service has been added to the services database
checked for other signs of intrusion.
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
checked for other signs of intrusion.
familiar with what is there, and note any changes.
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
The indicated service has been added to the services database
The indicated service has been added to the services database
If it is not apparent why it is like this, the system should be
The indicated service has been added to the services database
Code [inet004i]
Code [inet005w]
Code [inet004i]
checked for other signs of intrusion.
Code [inet004i]
Code [inet004i]
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
Code [inet004i]
Code [inet004i]
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
Code [inet005w]
as distributed. These are normal output, but you should be
Code [inet004i]
Code [inet004i]
Code [inet004i]
familiar with what is there, and note any changes.
Code [inet004i]
Code [inet004i]
Code [inet004i]
'inetd' is using the indicated binary for the listed service instead
Code [inet004i]
The indicated service has been added to the services database
familiar with what is there, and note any changes.
Code [inet004i]
Code [inet004i]
Code [inet004i]
The indicated service has been added to the services database
Code [inet004i]
Code [inet005w]
Code [inet004i]
The indicated service has been added to the services database
Code [inet004i]
of what is normally expected there. Unexpected differences should
as distributed. These are normal output, but you should be
Code [inet005w]
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
Code [inet005w]
as distributed. These are normal output, but you should be
The indicated service has been added to the services database
of what is normally expected there. Unexpected differences should
as distributed. These are normal output, but you should be
Code [inet004i]
Code [inet004i]
Code [inet005w]
Code [inet005w]
as distributed. These are normal output, but you should be
Code [inet005w]
Code [inet005w]
Code [inet005w]
Code [inet005w]
The indicated service has been added to the services database
'inetd' is using the indicated binary for the listed service instead
as distributed. These are normal output, but you should be
as distributed. These are normal output, but you should be
The indicated service has been added to the services database
be checked, and if anything unusual is found, the system should
The indicated service has been added to the services database
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
Code [inet005w]
'inetd' is using the indicated binary for the listed service instead
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
'inetd' is using the indicated binary for the listed service instead
familiar with what is there, and note any changes.
be checked, and if anything unusual is found, the system should
as distributed. These are normal output, but you should be
Code [inet005w]
Code [inet005w]
The indicated service has been added to the services database
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
'inetd' is using the indicated binary for the listed service instead
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
Code [inet005w]
'inetd' is using the indicated binary for the listed service instead
Code [inet005w]
Code [inet005w]
of what is normally expected there. Unexpected differences should
Code [inet005w]
Code [inet005w]
be checked, and if anything unusual is found, the system should
Code [inet005w]
Code [inet005w]
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
Code [inet005w]
'inetd' is using the indicated binary for the listed service instead
Code [inet005w]
Code [inet005w]
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
Code [inet005w]
be checked, and if anything unusual is found, the system should
'inetd' is using the indicated binary for the listed service instead
be checked, and if anything unusual is found, the system should
Code [inet005w]
Code [inet006f]
be checked, and if anything unusual is found, the system should
'inetd' is using the indicated binary for the listed service instead
Code [inet006f]
be checked for other signs of intrusion.
'inetd' is using the indicated binary for the listed service instead
Code [inet005w]
Code [inet005w]
be checked for other signs of intrusion.
'inetd' is using the indicated binary for the listed service instead
Code [inet005w]
be checked, and if anything unusual is found, the system should
Code [inet005w]
be checked, and if anything unusual is found, the system should
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
be checked for other signs of intrusion.
Code [inet005w]
be checked for other signs of intrusion.
Code [inet005w]
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
Code [inet005w]
of what is normally expected there. Unexpected differences should
be checked for other signs of intrusion.
be checked for other signs of intrusion.
'inetd' is using the indicated binary for the listed service instead
Code [inet005w]
be checked for other signs of intrusion.
Code [inet005w]
'inetd' is using the indicated binary for the listed service instead
be checked for other signs of intrusion.
of what is normally expected there. Unexpected differences should
Code [inet006f]
be checked, and if anything unusual is found, the system should
Code [inet006f]
Code [inet006f]
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
of what is normally expected there. Unexpected differences should
Code [inet006f]
Code [inet006f]
Code [inet006f]
be checked, and if anything unusual is found, the system should
Code [inet006f]
Code [inet006f]
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
Code [inet006f]
be checked, and if anything unusual is found, the system should
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
Code [inet006f]
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
The 'rexd' (or 'exec') service is very insecure and should never be
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
Code [inet006f]
Code [inet006f]
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
Code [inet006f]
enabled. Known rexd servers have little or no security in their design
or implementation. Intruders can exploit this service to execute
be checked for other signs of intrusion.
Code [inet006f]
Code [inet006f]
enabled. Known rexd servers have little or no security in their design
Code [inet006f]
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
Code [inet006f]
Code [inet006f]
Code [inet006f]
be checked for other signs of intrusion.
be checked for other signs of intrusion.
Code [inet006f]
Code [inet006f]
or implementation. Intruders can exploit this service to execute
The 'rexd' (or 'exec') service is very insecure and should never be
Code [inet006f]
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
It should be disabled immediately by editing the inetd.conf file
Code [inet006f]
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
It should be disabled immediately by editing the inetd.conf file
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
commands as any user.
commands as any user.
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
Code [inet006f]
or implementation. Intruders can exploit this service to execute
Code [inet006f]
Code [inet006f]
The 'rexd' (or 'exec') service is very insecure and should never be
enabled. Known rexd servers have little or no security in their design
commands as any user.
enabled. Known rexd servers have little or no security in their design
commands as any user.
The 'rexd' (or 'exec') service is very insecure and should never be
enabled. Known rexd servers have little or no security in their design
The 'rexd' (or 'exec') service is very insecure and should never be
commands as any user.
commands as any user.
enabled. Known rexd servers have little or no security in their design
and removing the 'rexd' entry, and sending a HUP signal to the
The 'rexd' (or 'exec') service is very insecure and should never be
commands as any user.
commands as any user.
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
and removing the 'rexd' entry, and sending a HUP signal to the
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
The 'rexd' (or 'exec') service is very insecure and should never be
Code [inet006f]
commands as any user.
Code [inet006f]
It should be disabled immediately by editing the inetd.conf file
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
It should be disabled immediately by editing the inetd.conf file
The 'rexd' (or 'exec') service is very insecure and should never be
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
'inetd' process.
enabled. Known rexd servers have little or no security in their design
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
'inetd' process.
enabled. Known rexd servers have little or no security in their design
It should be disabled immediately by editing the inetd.conf file
or implementation. Intruders can exploit this service to execute
It should be disabled immediately by editing the inetd.conf file
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
The 'rexd' (or 'exec') service is very insecure and should never be
The 'rexd' (or 'exec') service is very insecure and should never be
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
It should be disabled immediately by editing the inetd.conf file
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
and removing the 'rexd' entry, and sending a HUP signal to the
It should be disabled immediately by editing the inetd.conf file
commands as any user.
enabled. Known rexd servers have little or no security in their design
and removing the 'rexd' entry, and sending a HUP signal to the
or implementation. Intruders can exploit this service to execute
commands as any user.
commands as any user.
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
or implementation. Intruders can exploit this service to execute
It should be disabled immediately by editing the inetd.conf file
or implementation. Intruders can exploit this service to execute
commands as any user.
and removing the 'rexd' entry, and sending a HUP signal to the
or implementation. Intruders can exploit this service to execute
and removing the 'rexd' entry, and sending a HUP signal to the
commands as any user.
commands as any user.
commands as any user.
commands as any user.
enabled. Known rexd servers have little or no security in their design
It should be disabled immediately by editing the inetd.conf file
enabled. Known rexd servers have little or no security in their design
or implementation. Intruders can exploit this service to execute
commands as any user.
or implementation. Intruders can exploit this service to execute
and removing the 'rexd' entry, and sending a HUP signal to the
'inetd' process.
commands as any user.
commands as any user.
and removing the 'rexd' entry, and sending a HUP signal to the
or implementation. Intruders can exploit this service to execute
and removing the 'rexd' entry, and sending a HUP signal to the
or implementation. Intruders can exploit this service to execute
and removing the 'rexd' entry, and sending a HUP signal to the
commands as any user.
'inetd' process.
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
commands as any user.
and removing the 'rexd' entry, and sending a HUP signal to the
commands as any user.
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
'inetd' process.
commands as any user.
'inetd' process.
and removing the 'rexd' entry, and sending a HUP signal to the
or implementation. Intruders can exploit this service to execute
commands as any user.
'inetd' process.
or implementation. Intruders can exploit this service to execute
commands as any user.
'inetd' process.
It should be disabled immediately by editing the inetd.conf file
commands as any user.
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
'inetd' process.
commands as any user.
'inetd' process.
'inetd' process.
'inetd' process.
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
commands as any user.
commands as any user.
It should be disabled immediately by editing the inetd.conf file
For AIX systems, CERT Advisory CA-92:05 is applicable.
It should be disabled immediately by editing the inetd.conf file
and removing the 'rexd' entry, and sending a HUP signal to the
It should be disabled immediately by editing the inetd.conf file
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
It should be disabled immediately by editing the inetd.conf file
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
and removing the 'rexd' entry, and sending a HUP signal to the
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
It should be disabled immediately by editing the inetd.conf file
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
For AIX systems, CERT Advisory CA-92:05 is applicable.
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
'inetd' process.
and removing the 'rexd' entry, and sending a HUP signal to the
and removing the 'rexd' entry, and sending a HUP signal to the
that you previously thought you had turned off, or replace
'inetd' process.
'inetd' process.
'inetd' process.
'inetd' process.
'inetd' process.
and removing the 'rexd' entry, and sending a HUP signal to the
For AIX systems, CERT Advisory CA-92:05 is applicable.
'inetd' process.
Notice that some intruders may turn on a service
and removing the 'rexd' entry, and sending a HUP signal to the
It should be disabled immediately by editing the inetd.conf file
It should be disabled immediately by editing the inetd.conf file
'inetd' process.
'inetd' process.
and removing the 'rexd' entry, and sending a HUP signal to the
Notice that some intruders may turn on a service
and removing the 'rexd' entry, and sending a HUP signal to the
'inetd' process.
the inetd program with a Trojan horse program.
'inetd' process.
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
'inetd' process.
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
'inetd' process.
'inetd' process.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
and removing the 'rexd' entry, and sending a HUP signal to the
Notice that some intruders may turn on a service
and removing the 'rexd' entry, and sending a HUP signal to the
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
'inetd' process.
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
'inetd' process.
Notice that some intruders may turn on a service
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
For AIX systems, CERT Advisory CA-92:05 is applicable.
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
'inetd' process.
'inetd' process.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
the inetd program with a Trojan horse program.
Code [inet007w]
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
Code [inet007w]
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
that you previously thought you had turned off, or replace
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
For AIX systems, CERT Advisory CA-92:05 is applicable.
For AIX systems, CERT Advisory CA-92:05 is applicable.
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
the inetd program with a Trojan horse program.
For AIX systems, CERT Advisory CA-92:05 is applicable.
the inetd program with a Trojan horse program.
the inetd program with a Trojan horse program.
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
'inetd' is using the indicated executable for a port other than
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
Code [inet007w]
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
the inetd program with a Trojan horse program.
Code [inet007w]
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
what would normally be expected for this port. This may indicate
Code [inet007w]
that you previously thought you had turned off, or replace
Code [inet007w]
Notice that some intruders may turn on a service
'inetd' is using the indicated executable for a port other than
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
Code [inet007w]
that you previously thought you had turned off, or replace
Code [inet007w]
that you previously thought you had turned off, or replace
Code [inet007w]
Code [inet007w]
'inetd' is using the indicated executable for a port other than
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
the inetd program with a Trojan horse program.
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
the inetd program with a Trojan horse program.
Notice that some intruders may turn on a service
a backdoor into the system and should be checked. If anything
that you previously thought you had turned off, or replace
that you previously thought you had turned off, or replace
Code [inet007w]
Code [inet007w]
the inetd program with a Trojan horse program.
Code [inet007w]
a backdoor into the system and should be checked. If anything
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
'inetd' is using the indicated executable for a port other than
the inetd program with a Trojan horse program.
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
the inetd program with a Trojan horse program.
'inetd' is using the indicated executable for a port other than
Code [inet007w]
what would normally be expected for this port. This may indicate
that you previously thought you had turned off, or replace
'inetd' is using the indicated executable for a port other than
the inetd program with a Trojan horse program.
the inetd program with a Trojan horse program.
'inetd' is using the indicated executable for a port other than
'inetd' is using the indicated executable for a port other than
what would normally be expected for this port. This may indicate
the inetd program with a Trojan horse program.
that you previously thought you had turned off, or replace
Code [inet007w]
a backdoor into the system and should be checked. If anything
Code [inet007w]
what would normally be expected for this port. This may indicate
what would normally be expected for this port. This may indicate
the inetd program with a Trojan horse program.
Code [inet007w]
of intrusion.
the inetd program with a Trojan horse program.
Code [inet007w]
what would normally be expected for this port. This may indicate
that you previously thought you had turned off, or replace
Code [inet007w]
what would normally be expected for this port. This may indicate
Code [inet007w]
a backdoor into the system and should be checked. If anything
Code [inet007w]
what would normally be expected for this port. This may indicate
Code [inet007w]
what would normally be expected for this port. This may indicate
Code [inet007w]
a backdoor into the system and should be checked. If anything
Code [inet007w]
'inetd' is using the indicated executable for a port other than
been completed.
files are required for the checks to proceed. This either indicates
One or the other of the two listed files are unavailable. These
files are required for the checks to proceed. This either indicates
One or the other of the two listed files are unavailable. These
files are required for the checks to proceed. This either indicates
been completed.
been completed.
One or the other of the two listed files are unavailable. These
One or the other of the two listed files are unavailable. These
files are required for the checks to proceed. This either indicates
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
One or the other of the two listed files are unavailable. These
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
an incorrect configuration, or that a port to this machine has not
either a misconfiguration in the services database, or a possible
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
files are required for the checks to proceed. This either indicates
either a misconfiguration in the services database, or a possible
files are required for the checks to proceed. This either indicates
an incorrect configuration, or that a port to this machine has not
One or the other of the two listed files are unavailable. These
been completed.
an incorrect configuration, or that a port to this machine has not
The indicated service is assigned to the wrong port. This indicates
either a misconfiguration in the services database, or a possible
been completed.
been completed.
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
been completed.
been completed.
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
an incorrect configuration, or that a port to this machine has not
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
been completed.
The indicated service is assigned to the wrong port. This indicates
either a misconfiguration in the services database, or a possible
an incorrect configuration, or that a port to this machine has not
been completed.
been completed.
either a misconfiguration in the services database, or a possible
been completed.
is not apparent why it is like this, the system should be checked
an incorrect configuration, or that a port to this machine has not
been completed.
either a misconfiguration in the services database, or a possible
sign of an intrusion. This should be checked and corrected. If it
either a misconfiguration in the services database, or a possible
been completed.
either a misconfiguration in the services database, or a possible
sign of an intrusion. This should be checked and corrected. If it
either a misconfiguration in the services database, or a possible
sign of an intrusion. This should be checked and corrected. If it
either a misconfiguration in the services database, or a possible
been completed.
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
The indicated service is assigned to the wrong port. This indicates
either a misconfiguration in the services database, or a possible
for other signs of intrusion.
sign of an intrusion. This should be checked and corrected. If it
The indicated service is assigned to the wrong port. This indicates
sign of an intrusion. This should be checked and corrected. If it
either a misconfiguration in the services database, or a possible
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
The indicated service is assigned to the wrong port. This indicates
sign of an intrusion. This should be checked and corrected. If it
for other signs of intrusion.
either a misconfiguration in the services database, or a possible
sign of an intrusion. This should be checked and corrected. If it
The indicated port number is assigned to another service. This
for other signs of intrusion.
sign of an intrusion. This should be checked and corrected. If it
The indicated service is assigned to the wrong port. This indicates
sign of an intrusion. This should be checked and corrected. If it
The indicated port number is assigned to another service. This
sign of an intrusion. This should be checked and corrected. If it
is not apparent why it is like this, the system should be checked
either a misconfiguration in the services database, or a possible
either a misconfiguration in the services database, or a possible
sign of an intrusion. This should be checked and corrected. If it
either a misconfiguration in the services database, or a possible
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
is not apparent why it is like this, the system should be checked
is not apparent why it is like this, the system should be checked
indicates either a misconfiguration in the services database, or a
either a misconfiguration in the services database, or a possible
is not apparent why it is like this, the system should be checked
either a misconfiguration in the services database, or a possible
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
is not apparent why it is like this, the system should be checked
is not apparent why it is like this, the system should be checked
sign of an intrusion. This should be checked and corrected. If it
sign of an intrusion. This should be checked and corrected. If it
The indicated port number is assigned to another service. This
sign of an intrusion. This should be checked and corrected. If it
for other signs of intrusion.
sign of an intrusion. This should be checked and corrected. If it
for other signs of intrusion.
is not apparent why it is like this, the system should be checked
The indicated port number is assigned to another service. This
is not apparent why it is like this, the system should be checked
The indicated port number is assigned to another service. This
for other signs of intrusion.
The indicated port number is assigned to another service. This
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
indicates either a misconfiguration in the services database, or a
for other signs of intrusion.
The indicated port number is assigned to another service. This
for other signs of intrusion.
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
for other signs of intrusion.
is not apparent why it is like this, the system should be checked
The indicated port number is assigned to another service. This
for other signs of intrusion.
If it is not apparent why it is like this, the system should be
If it is not apparent why it is like this, the system should be
is not apparent why it is like this, the system should be checked
indicates either a misconfiguration in the services database, or a
indicates either a misconfiguration in the services database, or a
is not apparent why it is like this, the system should be checked
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
indicates either a misconfiguration in the services database, or a
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
possible sign of an intrusion. This should be checked and corrected.
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
The indicated port number is assigned to another service. This
The indicated port number is assigned to another service. This
If it is not apparent why it is like this, the system should be
The indicated port number is assigned to another service. This
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
The indicated port number is assigned to another service. This
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
If it is not apparent why it is like this, the system should be
If it is not apparent why it is like this, the system should be
The indicated service has been added to the services database
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
checked for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
indicates either a misconfiguration in the services database, or a
The indicated service has been added to the services database
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
indicates either a misconfiguration in the services database, or a
checked for other signs of intrusion.
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
The indicated port number is assigned to another service. This
possible sign of an intrusion. This should be checked and corrected.
The indicated port number is assigned to another service. This
indicates either a misconfiguration in the services database, or a
If it is not apparent why it is like this, the system should be
possible sign of an intrusion. This should be checked and corrected.
indicates either a misconfiguration in the services database, or a
indicates either a misconfiguration in the services database, or a
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
indicates either a misconfiguration in the services database, or a
possible sign of an intrusion. This should be checked and corrected.
If it is not apparent why it is like this, the system should be
possible sign of an intrusion. This should be checked and corrected.
possible sign of an intrusion. This should be checked and corrected.
as distributed. These are normal output, but you should be
indicates either a misconfiguration in the services database, or a
If it is not apparent why it is like this, the system should be
If it is not apparent why it is like this, the system should be
indicates either a misconfiguration in the services database, or a
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
The indicated service has been added to the services database
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
as distributed. These are normal output, but you should be
The indicated service has been added to the services database
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
checked for other signs of intrusion.
checked for other signs of intrusion.
If it is not apparent why it is like this, the system should be
as distributed. These are normal output, but you should be
as distributed. These are normal output, but you should be
checked for other signs of intrusion.
as distributed. These are normal output, but you should be
checked for other signs of intrusion.
as distributed. These are normal output, but you should be
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
checked for other signs of intrusion.
checked for other signs of intrusion.
familiar with what is there, and note any changes.
The indicated service has been added to the services database
checked for other signs of intrusion.
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
The indicated service has been added to the services database
The indicated service has been added to the services database
familiar with what is there, and note any changes.
The indicated service has been added to the services database
The indicated service has been added to the services database
'inetd' is using the indicated binary for the listed service instead
The indicated service has been added to the services database
familiar with what is there, and note any changes.
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
The indicated service has been added to the services database
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
as distributed. These are normal output, but you should be
The indicated service has been added to the services database
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
The indicated service has been added to the services database
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
as distributed. These are normal output, but you should be
'inetd' is using the indicated binary for the listed service instead
familiar with what is there, and note any changes.
of what is normally expected there. Unexpected differences should
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
be checked for other signs of intrusion.
as distributed. These are normal output, but you should be
familiar with what is there, and note any changes.
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
familiar with what is there, and note any changes.
be checked for other signs of intrusion.
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
familiar with what is there, and note any changes.
as distributed. These are normal output, but you should be
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
familiar with what is there, and note any changes.
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
familiar with what is there, and note any changes.
be checked, and if anything unusual is found, the system should
be checked, and if anything unusual is found, the system should
familiar with what is there, and note any changes.
of what is normally expected there. Unexpected differences should
familiar with what is there, and note any changes.
be checked, and if anything unusual is found, the system should
be checked, and if anything unusual is found, the system should
'inetd' is using the indicated binary for the listed service instead
be checked for other signs of intrusion.
be checked for other signs of intrusion.
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
The 'rexd' (or 'exec') service is very insecure and should never be
of what is normally expected there. Unexpected differences should
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
'inetd' is using the indicated binary for the listed service instead
be checked, and if anything unusual is found, the system should
of what is normally expected there. Unexpected differences should
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
enabled. Known rexd servers have little or no security in their design
enabled. Known rexd servers have little or no security in their design
be checked, and if anything unusual is found, the system should
be checked, and if anything unusual is found, the system should
'inetd' is using the indicated binary for the listed service instead
'inetd' is using the indicated binary for the listed service instead
of what is normally expected there. Unexpected differences should
of what is normally expected there. Unexpected differences should
be checked, and if anything unusual is found, the system should
be checked, and if anything unusual is found, the system should
enabled. Known rexd servers have little or no security in their design
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
The 'rexd' (or 'exec') service is very insecure and should never be
enabled. Known rexd servers have little or no security in their design
commands as any user.
The 'rexd' (or 'exec') service is very insecure and should never be
be checked for other signs of intrusion.
commands as any user.
enabled. Known rexd servers have little or no security in their design
be checked for other signs of intrusion.
be checked for other signs of intrusion.
enabled. Known rexd servers have little or no security in their design
The 'rexd' (or 'exec') service is very insecure and should never be
enabled. Known rexd servers have little or no security in their design
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
be checked, and if anything unusual is found, the system should
be checked for other signs of intrusion.
enabled. Known rexd servers have little or no security in their design
be checked for other signs of intrusion.
or implementation. Intruders can exploit this service to execute
enabled. Known rexd servers have little or no security in their design
or implementation. Intruders can exploit this service to execute
The 'rexd' (or 'exec') service is very insecure and should never be
or implementation. Intruders can exploit this service to execute
commands as any user.
or implementation. Intruders can exploit this service to execute
commands as any user.
The 'rexd' (or 'exec') service is very insecure and should never be
or implementation. Intruders can exploit this service to execute
or implementation. Intruders can exploit this service to execute
commands as any user.
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
For AIX systems, CERT Advisory CA-92:05 is applicable.
Notice that some intruders may turn on a service
Notice that some intruders may turn on a service
For AIX systems, CERT Advisory CA-92:05 is applicable.
'inetd' is using the indicated executable for a port other than
the inetd program with a Trojan horse program.
For AIX systems, CERT Advisory CA-92:05 is applicable.
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
what would normally be expected for this port. This may indicate
Notice that some intruders may turn on a service
that you previously thought you had turned off, or replace
that you previously thought you had turned off, or replace
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
'inetd' is using the indicated executable for a port other than
unusual is found, the system should be checked for other signs
that you previously thought you had turned off, or replace
Notice that some intruders may turn on a service
that you previously thought you had turned off, or replace
the inetd program with a Trojan horse program.
'inetd' is using the indicated executable for a port other than
the inetd program with a Trojan horse program.
'inetd' is using the indicated executable for a port other than
the inetd program with a Trojan horse program.
what would normally be expected for this port. This may indicate
'inetd' is using the indicated executable for a port other than
unusual is found, the system should be checked for other signs
the inetd program with a Trojan horse program.
'inetd' is using the indicated executable for a port other than
what would normally be expected for this port. This may indicate
the inetd program with a Trojan horse program.
what would normally be expected for this port. This may indicate
a backdoor into the system and should be checked. If anything
that you previously thought you had turned off, or replace
what would normally be expected for this port. This may indicate
the inetd program with a Trojan horse program.
of intrusion.
a backdoor into the system and should be checked. If anything