{"vuid":"VU#13217","idnumber":"13217","name":"Problem with HP r-cmnds","keywords":["HP-UX","r-cmnds","remshd","rexecd","rlogin","rlogind","remsh","rcp","rexec","rdist"],"overview":"A problem existed with HP versions of the r-commands (remshd, rexecd, rlogin, rlogind, remsh, rcp, rexec, rdist) in use circa December, 1998.","clean_desc":"See HEWLETT-PACKARD COMPANY SECURITY BULLETIN: #00090, (registration required) 07 December 1998 for a description of the problem. No other information is available. Quoting from that bulletin: Various HP-UX remote network commands (r-cmnds) in the fileset InternetSrvcs.INETSVCS-RUN have been enhanced. These include remshd(1M), rexecd(1M), rlogind(1M), rlogin(1), remsh(1), rcp(1), rexec(1), and rdist(1). All of these commands have been bundled into one convenient patch to address various operational and security defects noted the recent past.","impact":"The complete impact of this vulnerability is unknown.","resolution":"Install a patch as described in the bulletin, or upgrade to a later version.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Shawn V Hernan.","public":["h","t","t","p",":","/","/","u","s","-","s","u","p","p","o","r","t",".","e","x","t","e","r","n","a","l",".","h","p",".","c","o","m","/","a","t","q","/","b","i","n","/","d","o","c",".","p","l","/","s","i","d","=","6","2","e","6","1","c","1","a","1","2","d","a","c","8","2","5","c","4","/","s","c","r","e","e","n","=","a","t","q","D","o","c","T","e","x","t","S","e","c","B","/","?","C","E","R","T","D","O","C","I","D","=","H","P","S","B","U","X","9","8","1","2","-","0","9","0"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"1999-01-05T22:40:07Z","publicdate":"1999-12-07T00:00:00Z","datefirstpublished":"2001-12-15T02:41:10Z","dateupdated":"2001-12-15T02:41:19Z","revision":6,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"1","cam_impact":"10","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"0.421875","cam_scorecurrentwidelyknown":"0.5625","cam_scorecurrentwidelyknownexploited":"1.125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.421875,"vulnote":null}