COMMAND
rexecd/rshd
SYSTEMS AFFECTED
Denicomp REXECD/RSHD
PROBLEM
Following is based on a Strumpf Noir Society Advisories.
Denicomp's REXECD and RSHD products are ports of their
counterparts on Unix-based systems, allowing the use of the rcp,
rsh and rexec commands on machines running MS Windows.
There exists a problem in the port-handling code of mentioned
products which exposes the services provided by these to a DoS
attack.
When a string of +/- 4300 bytes is sent to the listening port of
the REXEC and/or RSH daemons (defaulting to the standard 512 and
514 ports), the service in question will die.
A restart will be needed to regain full functionality.
Vulnerable (tested):
- Denicomp Winsock RSHD/NT v2.18.00 (Intel)
- Denicomp Winsock RSHD/NT v2.17.07 (DEC Alpha)
- Denicomp Winsock REXECD/NT v1.05.00 (Intel)
- Denicomp Winsock REXECD/NT v1.04.08 (DEC Alpha)
- Denicomp Winsock RSHD/95 v2.18.03
- Denicomp Winsock REXECD/95 v1.00.02
Earlier versions are expected to be vulnerable as well, users are
encouraged to upgrade.
SOLUTION
Vendor has been notified and has verified this problem. New
versions of these products will be released from the vendor's
website shortly.