Vulnerabilities > CVE-2005-4310 - Unspecified vulnerability in SSH Tectia Server 5.0.0A/5.0.0F/5.0.0T

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
ssh
nessus

Summary

SSH Tectia Server 5.0.0 (A, F, and T), when allowing host-based authentication only, allows users to log in with the wrong credentials.

Vulnerable Configurations

Part Description Count
Application
Ssh
3

Nessus

NASL familyMisc.
NASL idTECTIA_SSH_SERVER_HOST_BYPASS.NASL
descriptionYou are running a version of Tectia SSH server that is older than 5.0.1. Versions older than 5.0.1 are vulnerable to a flaw in which an attacker may bypass the authentication routine. However, the ssh server must be configured to use Host-Based authentication only.
last seen2020-06-01
modified2020-06-02
plugin id20316
published2005-12-16
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/20316
titleSSH Tectia Server Host Authentication Authorization Bypass Vulnerability
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if(description)
{
 script_id(20316);
 script_version ("1.14");

 script_cve_id("CVE-2005-4310");
 script_bugtraq_id(15903);
 
 name["english"] = "SSH Tectia Server Host Authentication Authorization Bypass Vulnerability";
 script_name(english:name["english"]);
 
 script_set_attribute(attribute:"synopsis", value:
"It is possible to bypass the authentication of the remote ssh server." );
 script_set_attribute(attribute:"description", value:
"You are running a version of Tectia SSH server that is older than 5.0.1.

Versions older than 5.0.1 are vulnerable to a flaw in which an attacker
may bypass the authentication routine. However, the ssh server must be 
configured to use Host-Based authentication only." );
 script_set_attribute(attribute:"solution", value:
"Upgrade to Tectia SSH server 5.0.1 and later." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
 script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"false");
 script_set_attribute(attribute:"plugin_publication_date", value: "2005/12/16");
 script_set_attribute(attribute:"vuln_publication_date", value: "2005/12/15");
 script_cvs_date("Date: 2018/08/01 17:36:12");
 script_set_attribute(attribute:"plugin_type", value:"remote");
 script_set_attribute(attribute:"cpe",value:"cpe:/a:ssh:tectia_server");
 script_end_attributes();
 
 summary["english"] = "Checks for the remote SSH version";
 script_summary(english:summary["english"]);
 
 script_category(ACT_GATHER_INFO);
 script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
 family["english"] = "Misc.";
 script_family(english:family["english"]);
 script_dependencie("ssh_detect.nasl");
 script_require_ports("Services/ssh", 22);
 exit(0);
}

#
# The script code starts here
#

port = get_kb_item("Services/ssh");
if(!port)port = 22;

banner = get_kb_item("SSH/banner/" + port );
if ( ! banner ) exit(0);

banner = tolower(banner);

if("ssh tectia server" >< banner)
{
 if(ereg(pattern:"^ssh-2.0-([0-4]\..*|5.0.0.*) ssh tectia server.*", string:banner))
	security_hole(port);
}