Case Study: rcp and rdist
5
rcp and rdist use the rsh protocol.
The rsh protocol requires that the client program be on a privileged port.
Thus, rcp and rdist run as root.
Both have a long history of security holes…
Previous slide
Next slide
Back to first slide
View graphic version