Vulnerabilities > CVE-2000-0113 - Unspecified vulnerability in Sybergen Sygate 2.0/3.11

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
sybergen
nessus

Summary

The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics.

Vulnerable Configurations

Part Description Count
Application
Sybergen
2

Nessus

NASL familyBackdoors
NASL idSYGATE_REMOTE_CONTROL.NASL
descriptionSyGate engine remote controller seems to be running on this port. It may be used by malicious users that are on the same subnet as this host to reconfigure the remote SyGate engine.
last seen2020-06-01
modified2020-06-02
plugin id10274
published2000-01-29
reporterThis script is Copyright (C) 2000-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/10274
titleSyGate Backdoor Detection
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(10274);
 script_version ("1.24");

 script_cve_id("CVE-2000-0113");
 script_bugtraq_id(952);
 
 script_name(english: "SyGate Backdoor Detection");
 
 script_set_attribute(attribute:"synopsis", value:
"Arbitrary code may be run on the remote host." );
 script_set_attribute(attribute:"description", value:
"SyGate engine remote controller seems to be running on this port. 
It may be used by malicious users that are on the same subnet as this host
to reconfigure the remote SyGate engine." );
 script_set_attribute(attribute:"solution", value:
"Filter incoming traffic to this port." );
 script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:H/RL:U/RC:ND");
 script_set_attribute(attribute:"plugin_publication_date", value: "2000/01/29");
 script_set_attribute(attribute:"vuln_publication_date", value: "2000/01/27");
 script_cvs_date("Date: 2018/06/13 18:56:25");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_end_attributes();

 script_summary(english: "Detects whether SyGate remote controller is running");
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2000-2018 Tenable Network Security, Inc.");
 script_family(english: "Backdoors");
 script_require_ports(7323);
 exit(0);
}

#
# The script code starts here
#

include('telnet_func.inc');
port = 7323;
if (get_port_state(port))
{
 banner = get_telnet_banner(port:port);
 if("yGate" >< banner)security_hole(port);
}