Vulnerabilities > CVE-2005-4310 - Authentication Authorization Bypass vulnerability in SSH Tectia Server 5.0.0A/5.0.0F/5.0.0T

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ssh
nessus

Summary

SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.

Vulnerable Configurations

Part Description Count
Application
Ssh
3

Nessus

NASL familyMisc.
NASL idTECTIA_SSH_SERVER_HOST_BYPASS.NASL
descriptionYou are running a version of Tectia SSH server that is older than 5.0.1. Versions older than 5.0.1 are vulnerable to a flaw in which an attacker may bypass the authentication routine. However, the ssh server must be configured to use Host-Based authentication only.
last seen2020-06-01
modified2020-06-02
plugin id20316
published2005-12-16
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20316
titleSSH Tectia Server Host Authentication Authorization Bypass Vulnerability
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(20316);
 script_version ("1.14");

 script_cve_id("CVE-2005-4310");
 script_bugtraq_id(15903);
 
 name["english"] = "SSH Tectia Server Host Authentication Authorization Bypass Vulnerability";
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to bypass the authentication of the remote ssh server." );
 script_set_attribute(attribute:"description", value:
"You are running a version of Tectia SSH server that is older than 5.0.1.

Versions older than 5.0.1 are vulnerable to a flaw in which an attacker
may bypass the authentication routine. However, the ssh server must be 
configured to use Host-Based authentication only." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Tectia SSH server 5.0.1 and later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/16");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/15");
 script_cvs_date("Date: 2018/08/01 17:36:12");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:ssh:tectia_server");
 script_end_attributes();
 
 summary["english"] = "Checks for the remote SSH version";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 family["english"] = "Misc.";
 script_family(english:family["english"]);
 script_dependencie("ssh_detect.nasl");
 script_require_ports("Services/ssh", 22);
 exit(0);
}

#
# The script code starts here
#

port = get_kb_item("Services/ssh");
if(!port)port = 22;

banner = get_kb_item("SSH/banner/" + port );
if ( ! banner ) exit(0);

banner = tolower(banner);

if("ssh tectia server" >< banner)
{
 if(ereg(pattern:"^ssh-2.0-([0-4]\..*|5.0.0.*) ssh tectia server.*", string:banner))
	security_hole(port);
}