Rshd.Windows.Server.Stack.Overflow

description-logoDescription

This indicates an attempt to exploit a stack based buffer overflow in Mike Dubman's Windows RSH daemon.
A stack based buffer overflow vulnerability has been identified in RSHD daemon (rshd.exe). It is caused by a boundary check error and can be exploited via an overly long, specially crafted packet sent to the default port 514/TCP.

affected-products-logoAffected Products

Mike Dubman Windows RSH daemon (rshd) 1.7 and 1.8

Impact logoImpact

Denial of service.
System comprpomise: remote code execution.

recomended-action-logoRecommended Actions

Workaround: use secure shell(sshd) as a replacement for rshd.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2020-09-29 16.933 Name:MS.
Windows.
Rshd.
Server.
Stack.
Overflow:Rshd.
Windows.
Server.
Stack.
Overflow