SyGate Backdoor Detection

high Nessus Plugin ID 10274

Synopsis

Arbitrary code may be run on the remote host.

Description

SyGate engine remote controller seems to be running on this port. It may be used by malicious users that are on the same subnet as this host to reconfigure the remote SyGate engine.

Solution

Filter incoming traffic to this port.

Plugin Details

Severity: High

ID: 10274

File Name: sygate_remote_control.nasl

Version: 1.24

Type: remote

Family: Backdoors

Published: 1/29/2000

Updated: 6/13/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Vulnerability Publication Date: 1/27/2000

Reference Information

CVE: CVE-2000-0113

BID: 952