Executive Summary

Name CVE-1999-0113 First vendor Publication 1994-05-23
Vendor Cve Last vendor Modification 2008-09-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Some implementations of rlogin allow root access if given a -froot parameter.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0113

CAPEC : Common Attack Pattern Enumeration & Classification

Id Name
CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads
CAPEC-88 OS Command Injection
CAPEC-133 Try All Common Application Switches and Options

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

Os 4

Open Source Vulnerability Database (OSVDB)

Id Description
1007 Multiple Unix Vendor rlogin -froot Remote Authentication Bypass

The rlogin command of multiple Unix vendor contains a flaw that may allow a remote attacker to bypass authentication settings. The issue is triggered when using the '-froot' parameter, which allows a remote attacker to gain root access on a system without being prompted for a password resulting in a loss of integrity.

Snort® IPS/IDS

Date Description
2014-01-10 Unix rlogin froot parameter root access attempt
RuleID : 604-community - Revision : 14 - Type : PROTOCOL-SERVICES
2014-01-10 Unix rlogin froot parameter root access attempt
RuleID : 604 - Revision : 14 - Type : PROTOCOL-SERVICES

Nessus® Vulnerability Scanner

Date Description
2002-08-26 Name : It is possible to connect to this host as 'root' without a password.
File : rlogin_froot.nasl - Type : ACT_ATTACK

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/458

Alert History

If you want to see full details history, please login or register.
Date Informations
2021-05-04 12:00:52
  • Multiple Updates
2021-04-22 01:01:05
  • Multiple Updates
2020-05-23 00:14:05
  • Multiple Updates
2014-02-17 10:22:19
  • Multiple Updates
2014-01-19 21:20:35
  • Multiple Updates
2013-05-11 11:55:42
  • Multiple Updates