AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities

Medium Nessus Plugin ID 19589


The remote SSH server is affected by multiple vulnerabilities.


The remote host is running AttachmateWRQ Reflection for Secure IT Server, a commercial SSH server for Windows.

According to its banner, the installed version of Reflection for Secure IT Server on the remote host suffers from several vulnerabilities, including :

- An Access Restriction Bypass Vulnerability Access expressions are evaluated in a case-sensitive manner while in versions prior to 6.0 they were case- insensitive. This may let an attacker gain access to an otherwise restricted account by logging in using a variation on the account name.

- A Renamed Account Remote Login Vulnerability The application continues to accept valid public keys for authentication to the Administrator or Guest accounts if either has been renamed or disabled after being configured for SSH public key authentication,

- An Information Disclosure Vulnerability Users with access to the remote host can read the server's private key, which can lead to host impersonation attacks.


Upgrade to Reflection for Secure IT Server 6.0 build 24 or later.

See Also

Plugin Details

Severity: Medium

ID: 19589

File Name: wrq_reflection_60b24.nasl

Version: $Revision: 1.12 $

Type: remote

Family: Misc.

Published: 2005/09/06

Modified: 2016/06/13

Dependencies: 10267

Risk Information

Risk Factor: Medium


Base Score: 4.6

Temporal Score: 4.6

Vector: CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:H/RL:U/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2005/08/25

Reference Information

CVE: CVE-2005-2770, CVE-2005-2771

BID: 14733, 14734, 14735

OSVDB: 19265, 19266, 19267