rlogin Service Detection

This script is Copyright (C) 1999-2015 Tenable Network Security, Inc.

Synopsis :

The rlogin service is listening on the remote port.

Description :

The remote host is running the 'rlogin' service. This service is
dangerous since data is passed between the rlogin client and server in
cleartext. A remote attacker can exploit this to sniff logins and

Also, it may allow poorly authenticated logins without passwords. If
the host is vulnerable to TCP sequence number guessing (from any
network) or IP spoofing (including ARP hijacking on a local network)
then it may be possible to bypass authentication.

Finally, rlogin is an easy way to turn file-write access into full
logins through the .rhosts or rhosts.equiv files.

Solution :

Comment out the 'login' line in /etc/inetd.conf. Alternatively,
disable this service and use SSH instead.

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: Service detection

Nessus Plugin ID: 10205 ()

Bugtraq ID:

CVE ID: CVE-1999-0651