RSHSVC included in Windows NT 3.5x and Windows 4.0 Resource Kit Poses Security LeakID: Q158320
|
Although the RSHSVC utility included in the Windows NT Server Resource Kit uses the .Rhosts file for the Account Level Equivalence (ALE) security, RSHSVC does not do the ALE security check as is explicitly specified in the Rshsvc.txt or Rshsvc.htm files, therefore it poses a security leak or hole.
A Remote Shell Server Service (RSH) Daemon normally provides one or two
levels of security: the Host Level Equivalence (low/loose), by using the
Hosts.equiv file and the Account Level Equivalence (high/tighter), by using
the .Rhosts file (The period "." is part of the name!).
According to the Rshsvc.txt or Rshsvc.htm file, the Rshsvc.exe file
running on an IP host (local computer) provides the ALE security and is
supposed to check the user name (either the client user name or server user
name) of a user who tries to remotely access from a remote host, and the
remote host name against the entries in the .Rhosts file under the
%SystemRoot%\System32\Drivers\Etc directory on the local computer.
RSHSVC supposedly returns an access denied error message when any of the
following conditions occur:
Microsoft has confirmed this to be a problem in NT version 3.5x/4.0 and we
are researching this problem and will post new information here in the
Microsoft Knowledge Base as it becomes available.
Additional query words: Reskit
Keywords : kbnetwork kbtool NTInterop ntprotocol nttcp ntreskit
Version : WinNT:3.5,3.51,4.0
Platform : winnt
Issue type : kbbug
Last Reviewed: January 27, 1999