Lucene search

K
nessusThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.SYGATE_REMOTE_CONTROL.NASL
HistoryJan 29, 2000 - 12:00 a.m.

SyGate Backdoor Detection

2000-01-2900:00:00
This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
www.tenable.com
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.7%

SyGate engine remote controller seems to be running on this port. It may be used by malicious users that are on the same subnet as this host to reconfigure the remote SyGate engine.

#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10274);
 script_version ("1.24");

 script_cve_id("CVE-2000-0113");
 script_bugtraq_id(952);
 
 script_name(english: "SyGate Backdoor Detection");
 
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code may be run on the remote host." );
 script_set_attribute(attribute:"description", value:
"SyGate engine remote controller seems to be running on this port. 
It may be used by malicious users that are on the same subnet as this host
to reconfigure the remote SyGate engine." );
 script_set_attribute(attribute:"solution", value:
"Filter incoming traffic to this port." );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/01/29");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/01/27");
 script_cvs_date("Date: 2018/06/13 18:56:25");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_summary(english: "Detects whether SyGate remote controller is running");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english: "Backdoors");
 script_require_ports(7323);
 exit(0);
}

#
# The script code starts here
#

include('telnet_func.inc');
port = 7323;
if (get_port_state(port))
{
 banner = get_telnet_banner(port:port);
 if("yGate" >< banner)security_hole(port);
}

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.015 Low

EPSS

Percentile

86.7%

Related for SYGATE_REMOTE_CONTROL.NASL