A vulnerability was found in rsh. The vulnerability occurs due to a possible overwrite of arbitrary files by a malicious rsh server. This flaw allows an attacker or a malicious rsh server (or a Man-in-The-Middle attacker) to overwrite arbitrary files in a directory on the rcp client machine.