AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities

medium Nessus Plugin ID 19589

Synopsis

The remote SSH server is affected by multiple vulnerabilities.

Description

The remote host is running AttachmateWRQ Reflection for Secure IT Server, a commercial SSH server for Windows.

According to its banner, the installed version of Reflection for Secure IT Server on the remote host suffers from several vulnerabilities, including :

- An Access Restriction Bypass Vulnerability Access expressions are evaluated in a case-sensitive manner while in versions prior to 6.0 they were case- insensitive. This may let an attacker gain access to an otherwise restricted account by logging in using a variation on the account name.

- A Renamed Account Remote Login Vulnerability The application continues to accept valid public keys for authentication to the Administrator or Guest accounts if either has been renamed or disabled after being configured for SSH public key authentication,

- An Information Disclosure Vulnerability Users with access to the remote host can read the server's private key, which can lead to host impersonation attacks.

Solution

Upgrade to Reflection for Secure IT Server 6.0 build 24 or later.

See Also

https://support.microfocus.com/techdocs/1867.html

Plugin Details

Severity: Medium

ID: 19589

File Name: wrq_reflection_60b24.nasl

Version: 1.14

Type: remote

Family: Misc.

Published: 9/6/2005

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P

Vulnerability Information

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/25/2005

Reference Information

CVE: CVE-2005-2770, CVE-2005-2771

BID: 14733, 14734, 14735