{"cve": [{"lastseen": "2019-05-29T18:08:14", "bulletinFamily": "NVD", "description": "WRQ Reflection for Secure IT Windows Server 6.0 (formerly known as F-Secure SSH server) processes access and deny lists in a case-sensitive manner, when previous versions were case-insensitive, which might allow remote attackers to bypass intended restrictions and login to accounts that should be denied.", "modified": "2008-09-05T20:52:00", "id": "CVE-2005-2771", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2771", "published": "2005-09-02T23:03:00", "title": "CVE-2005-2771", "type": "cve", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2019-11-03T12:38:46", "bulletinFamily": "scanner", "description": "The remote host is running AttachmateWRQ Reflection for Secure IT\nServer, a commercial SSH server for Windows. \n\nAccording to its banner, the installed version of Reflection for\nSecure IT Server on the remote host suffers from several\nvulnerabilities, including :\n\n - An Access Restriction Bypass Vulnerability\n Access expressions are evaluated in a case-sensitive\n manner while in versions prior to 6.0 they were case-\n insensitive. This may let an attacker gain access\n to an otherwise restricted account by logging in\n using a variation on the account name.\n\n - A Renamed Account Remote Login Vulnerability\n The application continues to accept valid public keys\n for authentication to the Administrator or Guest\n accounts if either has been renamed or disabled after\n being configured for SSH public key authentication, \n\n - An Information Disclosure Vulnerability\n Users with access to the remote host can read the server", "modified": "2019-11-02T00:00:00", "id": "WRQ_REFLECTION_60B24.NASL", "href": "https://www.tenable.com/plugins/nessus/19589", "published": "2005-09-06T00:00:00", "title": "AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities", "type": "nessus", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n\n\ninclude(\"compat.inc\");\n\nif (description) {\n script_id(19589);\n script_version(\"1.14\");\n\n script_cve_id(\"CVE-2005-2770\", \"CVE-2005-2771\");\n script_bugtraq_id(14733, 14734, 14735);\n\n name[\"english\"] = \"AttachmateWRQ Reflection for Secure IT Server < 6.0 Build 24 Multiple Vulnerabilities\";\n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SSH server is affected by multiple vulnerabilities.\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is running AttachmateWRQ Reflection for Secure IT\nServer, a commercial SSH server for Windows. \n\nAccording to its banner, the installed version of Reflection for\nSecure IT Server on the remote host suffers from several\nvulnerabilities, including :\n\n - An Access Restriction Bypass Vulnerability\n Access expressions are evaluated in a case-sensitive\n manner while in versions prior to 6.0 they were case-\n insensitive. This may let an attacker gain access\n to an otherwise restricted account by logging in\n using a variation on the account name.\n\n - A Renamed Account Remote Login Vulnerability\n The application continues to accept valid public keys\n for authentication to the Administrator or Guest\n accounts if either has been renamed or disabled after\n being configured for SSH public key authentication, \n\n - An Information Disclosure Vulnerability\n Users with access to the remote host can read the server's\n private key, which can lead to host impersonation attacks.\" );\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microfocus.com/techdocs/1867.html\" );\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Reflection for Secure IT Server 6.0 build 24 or later.\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2005/09/06\");\n script_set_attribute(attribute:\"vuln_publication_date\", value: \"2005/08/25\");\n script_cvs_date(\"Date: 2018/11/15 20:50:24\");\nscript_set_attribute(attribute:\"plugin_type\", value:\"remote\");\nscript_end_attributes();\n\n \n summary[\"english\"] = \"Checks for multiple vulnerabilities in AttachmateWRQ Reflection for Secure IT Server < 6.0 build 24\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"ssh_detect.nasl\");\n script_require_ports(\"Services/ssh\", 22);\n\n exit(0);\n}\n\n\nport = get_kb_item(\"Services/ssh\");\nif (!port) port = 22;\n\n\nbanner = get_kb_item(\"SSH/banner/\" + port);\nif (banner) {\n if (egrep(string:banner, pattern:\"WRQReflectionForSecureIT_([0-5]\\.|6\\.0 Build ([01]|2[0-3]))\")) {\n security_warning(port);\n exit(0);\n }\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}]}