Vulnerabilities > CVE-2008-6021 - Unspecified vulnerability in Attachmate Reflection for Secure IT 7.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN attachmate
nessus
Summary
Multiple unspecified vulnerabilities in Attachmate Reflection for Secure IT UNIX Client and Server before 7.0 SP1 have unknown impact and attack vectors, aka "security vulnerabilities found by 3rd party analysis."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Windows NASL id ATTACHMATE_REFLECTION_SECURE_IT_WIN_701.NASL description The version of Attachmate Reflection for Secure IT Windows server installed on the remote Windows host is less than 7.0 SP1 and thus is reportedly affected by multiple unspecified vulnerabilities. last seen 2020-06-01 modified 2020-06-02 plugin id 55285 published 2011-06-21 reporter This script is Copyright (C) 2011-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/55285 title Attachmate Reflection for Secure IT Windows Server < 7.0 SP1 Multiple Unspecified Vulnerabilities code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(55285); script_version("1.5"); script_cvs_date("Date: 2018/11/15 20:50:26"); script_cve_id("CVE-2008-6021"); script_bugtraq_id(30723); script_name(english:"Attachmate Reflection for Secure IT Windows Server < 7.0 SP1 Multiple Unspecified Vulnerabilities"); script_summary(english:"Checks version of Attachmate Reflection for Secure IT"); script_set_attribute(attribute:"synopsis", value: "The remote SSH service is affected by multiple unspecified vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of Attachmate Reflection for Secure IT Windows server installed on the remote Windows host is less than 7.0 SP1 and thus is reportedly affected by multiple unspecified vulnerabilities."); script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4f7e3266"); script_set_attribute(attribute:"solution", value: "Upgrade to Attachmate Reflection for Secure IT Windows Server 7.0 SP1 (7.0.0 Build 505) or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"vuln_publication_date", value:"2009/02/02"); script_set_attribute(attribute:"patch_publication_date", value:"2009/02/02"); script_set_attribute(attribute:"plugin_publication_date", value:"2011/06/21"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:attachmate:reflection_for_secure_it"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Windows"); script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc."); script_dependencies("attachmate_reflection_secure_it_win_installed.nasl"); script_require_keys("SMB/Attachmate_Reflection_For_Secure_IT/path"); exit(0); } include('global_settings.inc'); include('misc_func.inc'); verui = get_kb_item_or_exit('SMB/Attachmate_Reflection_For_Secure_IT/verui'); path = get_kb_item_or_exit('SMB/Attachmate_Reflection_For_Secure_IT/path'); version = verui - strstr(verui, ' Build'); build = strstr(verui, 'Build'); build = ereg_replace(pattern:'^Build ([0-9]+)', string:build, replace:'\\1'); ver = split(version, sep:'.', keep:FALSE); if ( ver[0] < 7 || (ver[0] == 7 && ver[1] == 0 && ver[2] == 0 && build < 505) ) { if (report_verbosity > 0) { report = '\n Path : ' + path + '\n Installed version : ' + version + ' Build ' + build + '\n Fixed version : 7.0.0 Build 505\n'; security_hole(port:get_kb_item('SMB/transport'), extra:report); } else security_hole(get_kb_item('SMB/transport')); exit(0); } else exit(0, 'Attachmate Reflection for Secure IT '+verui+' is installed and thus is not affected.');
NASL family Misc. NASL id ATTACHMATE_REFLECTION_70_SP1.NASL description The version of Attachmate Reflection for Secure IT UNIX server installed on the remote host is less than 7.0 SP1 and thus reportedly affected by several issues : - There is an inherited vulnerability in OpenSSL when parsing malformed ASN.1 structures leading to a denial of service vulnerability (CVE-2006-2937). - There is an inherited vulnerability in OpenSSL when parsing parasitic public keys leading to a denial of service vulnerability (CVE-2006-2940). - There is an inherited vulnerability in OpenSSL when performing Montgomery multiplication, leading to a side-channel attack vulnerability (CVE-2007-3108). - There is an inherited vulnerability in OpenSSH with the execution of the ~/.ssh2/rc session file (CVE-2008-1657). - There is an issue with the security of forwarded X11 connections, leading to possible hijacking. (CVE-2008-1483) - There are multiple unspecified other vulnerabilities. (CVE-2008-6021) last seen 2020-06-01 modified 2020-06-02 plugin id 33948 published 2008-08-20 reporter This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/33948 title Attachmate Reflection for Secure IT UNIX server < 7.0 SP1 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(33948); script_version("1.21"); script_cve_id( "CVE-2006-2937", "CVE-2006-2940", "CVE-2007-3108", "CVE-2008-1483", "CVE-2008-1657", "CVE-2008-6021" ); script_bugtraq_id(28444, 30723); script_xref(name:"Secunia", value:"31531"); script_name(english:"Attachmate Reflection for Secure IT UNIX server < 7.0 SP1 Multiple Vulnerabilities"); script_summary(english:"Checks if SSH banner < 7.0.1.575"); script_set_attribute(attribute:"synopsis", value: "The remote SSH service is affected by multiple vulnerabilities." ); script_set_attribute(attribute:"description", value: "The version of Attachmate Reflection for Secure IT UNIX server installed on the remote host is less than 7.0 SP1 and thus reportedly affected by several issues : - There is an inherited vulnerability in OpenSSL when parsing malformed ASN.1 structures leading to a denial of service vulnerability (CVE-2006-2937). - There is an inherited vulnerability in OpenSSL when parsing parasitic public keys leading to a denial of service vulnerability (CVE-2006-2940). - There is an inherited vulnerability in OpenSSL when performing Montgomery multiplication, leading to a side-channel attack vulnerability (CVE-2007-3108). - There is an inherited vulnerability in OpenSSH with the execution of the ~/.ssh2/rc session file (CVE-2008-1657). - There is an issue with the security of forwarded X11 connections, leading to possible hijacking. (CVE-2008-1483) - There are multiple unspecified other vulnerabilities. (CVE-2008-6021)" ); script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?79d29f9f" ); script_set_attribute(attribute:"solution", value: "Upgrade to Attachmate Reflection for Secure IT UNIX server 7.0 SP1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_cwe_id(264, 399); script_set_attribute(attribute:"plugin_publication_date", value: "2008/08/20"); script_set_attribute(attribute:"vuln_publication_date", value: "2006/09/28"); script_cvs_date("Date: 2018/11/15 20:50:23"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_detect.nasl", "os_fingerprint.nasl"); script_require_ports("Services/ssh", 22); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); # Don't flag Windows hosts os = get_kb_item_or_exit("Host/OS"); if (os && "Windows" >< os) audit(AUDIT_OS_NOT, "a Unix and Unix-like OS", "Microsoft Windows"); port = get_kb_item("Services/ssh"); if (!port) port = 22; if (!get_port_state(port)) audit(AUDIT_PORT_CLOSED, port); # Check the version in the banner. banner = get_kb_item("SSH/banner/" + port); if (!banner) audit(AUDIT_WEB_BANNER_NOT, port); if ("ReflectionForSecureIT_" >!< banner) audit(AUDIT_NOT_LISTEN, "Attachmate Reflection for Secure IT UNIX server", port); ver = strstr(banner, "ReflectionForSecureIT_") - "ReflectionForSecureIT_"; if (!ver) audit(AUDIT_SERVICE_VER_FAIL, "Attachmate Reflection for Secure IT UNIX server SSH", port); arr = split(ver, sep:".", keep:FALSE); for ( i = 0 ; i < max_index(arr) ; i ++ ) { arr[i] = int(arr[i]); } vuln = FALSE; if (arr[0] && arr[0] < 7) vuln = TRUE; if (arr[0] && arr[0] == 7 && arr[1] && arr[1] == 0) { if (arr[2] && arr[2] < 1) vuln = TRUE; if (arr[2] && arr[2] == 1 && arr[3] && arr[3] < 575) vuln = TRUE; } if (vuln) { if (report_verbosity) { report = string( "\n", "The remote Attachmate Reflection for Secure IT UNIX server returned\n", "the following banner :\n", "\n", " ", banner, "\n" ); security_hole(port:port, extra:report); } else security_hole(port); } else audit(AUDIT_LISTEN_NOT_VULN, "Attachmate Reflection for Secure IT UNIX server", port, ver);