Vulnerabilities > CVE-2008-6021 - Security vulnerability in Attachmate Reflection for Secure IT 7.0

047910
CVSS 10.0 - CRITICAL
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
low complexity
attachmate
critical
nessus

Summary

Multiple unspecified vulnerabilities in Attachmate Reflection for Secure IT UNIX Client and Server before 7.0 SP1 have unknown impact and attack vectors, aka "security vulnerabilities found by 3rd party analysis."

Vulnerable Configurations

Part Description Count
Application
Attachmate
2

Nessus

  • NASL familyWindows
    NASL idATTACHMATE_REFLECTION_SECURE_IT_WIN_701.NASL
    descriptionThe version of Attachmate Reflection for Secure IT Windows server installed on the remote Windows host is less than 7.0 SP1 and thus is reportedly affected by multiple unspecified vulnerabilities.
    last seen2020-06-01
    modified2020-06-02
    plugin id55285
    published2011-06-21
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55285
    titleAttachmate Reflection for Secure IT Windows Server < 7.0 SP1 Multiple Unspecified Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include('compat.inc');
    
    if (description)
    {
      script_id(55285);
      script_version("1.5");
      script_cvs_date("Date: 2018/11/15 20:50:26");
    
      script_cve_id("CVE-2008-6021");
      script_bugtraq_id(30723);
    
      script_name(english:"Attachmate Reflection for Secure IT Windows Server < 7.0 SP1 Multiple Unspecified Vulnerabilities");
      script_summary(english:"Checks version of Attachmate Reflection for Secure IT");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote SSH service is affected by multiple unspecified
    vulnerabilities.");
    
      script_set_attribute(attribute:"description", value:
    "The version of Attachmate Reflection for Secure IT Windows server
    installed on the remote Windows host is less than 7.0 SP1 and thus is
    reportedly affected by multiple unspecified vulnerabilities.");
     
      script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4f7e3266");
      script_set_attribute(attribute:"solution", value:
    "Upgrade to Attachmate Reflection for Secure IT Windows Server 7.0 SP1
    (7.0.0 Build 505) or later.");
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2009/02/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2009/02/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/06/21");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/a:attachmate:reflection_for_secure_it");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows");
    
      script_copyright(english:"This script is Copyright (C) 2011-2018 Tenable Network Security, Inc.");
    
      script_dependencies("attachmate_reflection_secure_it_win_installed.nasl");
      script_require_keys("SMB/Attachmate_Reflection_For_Secure_IT/path");
    
      exit(0);
    }
    
    include('global_settings.inc');
    include('misc_func.inc');
    
    verui   = get_kb_item_or_exit('SMB/Attachmate_Reflection_For_Secure_IT/verui');
    path    = get_kb_item_or_exit('SMB/Attachmate_Reflection_For_Secure_IT/path');
    
    version = verui - strstr(verui, ' Build');
    build   = strstr(verui, 'Build');
    build   = ereg_replace(pattern:'^Build ([0-9]+)', string:build, replace:'\\1');
    ver = split(version, sep:'.', keep:FALSE);
    
    if (
      ver[0] < 7 ||
      (ver[0] == 7 && ver[1] == 0 && ver[2] == 0 && build < 505)
    )
    {
      if (report_verbosity > 0)
      {
        report = 
          '\n  Path              : ' + path + 
          '\n  Installed version : ' + version + ' Build ' + build +
          '\n  Fixed version     : 7.0.0 Build 505\n';
        security_hole(port:get_kb_item('SMB/transport'), extra:report);
      }
      else security_hole(get_kb_item('SMB/transport'));
      exit(0);
    }
    else exit(0, 'Attachmate Reflection for Secure IT '+verui+' is installed and thus is not affected.');
    
  • NASL familyMisc.
    NASL idATTACHMATE_REFLECTION_70_SP1.NASL
    descriptionThe version of Attachmate Reflection for Secure IT UNIX server installed on the remote host is less than 7.0 SP1 and thus reportedly affected by several issues : - There is an inherited vulnerability in OpenSSL when parsing malformed ASN.1 structures leading to a denial of service vulnerability (CVE-2006-2937). - There is an inherited vulnerability in OpenSSL when parsing parasitic public keys leading to a denial of service vulnerability (CVE-2006-2940). - There is an inherited vulnerability in OpenSSL when performing Montgomery multiplication, leading to a side-channel attack vulnerability (CVE-2007-3108). - There is an inherited vulnerability in OpenSSH with the execution of the ~/.ssh2/rc session file (CVE-2008-1657). - There is an issue with the security of forwarded X11 connections, leading to possible hijacking. (CVE-2008-1483) - There are multiple unspecified other vulnerabilities. (CVE-2008-6021)
    last seen2020-06-01
    modified2020-06-02
    plugin id33948
    published2008-08-20
    reporterThis script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/33948
    titleAttachmate Reflection for Secure IT UNIX server < 7.0 SP1 Multiple Vulnerabilities
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if (description)
    {
      script_id(33948);
      script_version("1.21");
    
      script_cve_id(
        "CVE-2006-2937",
        "CVE-2006-2940",
        "CVE-2007-3108",
        "CVE-2008-1483",
        "CVE-2008-1657",
        "CVE-2008-6021"
      );
      script_bugtraq_id(28444, 30723);
      script_xref(name:"Secunia", value:"31531");
    
      script_name(english:"Attachmate Reflection for Secure IT UNIX server < 7.0 SP1 Multiple Vulnerabilities");
      script_summary(english:"Checks if SSH banner < 7.0.1.575");
     
     script_set_attribute(attribute:"synopsis", value:
    "The remote SSH service is affected by multiple vulnerabilities." );
     script_set_attribute(attribute:"description", value:
    "The version of Attachmate Reflection for Secure IT UNIX server
    installed on the remote host is less than 7.0 SP1 and thus reportedly
    affected by several issues :
    
      - There is an inherited vulnerability in OpenSSL when
        parsing malformed ASN.1 structures leading to a
        denial of service vulnerability (CVE-2006-2937).
    
      - There is an inherited vulnerability in OpenSSL when
        parsing parasitic public keys leading to a
        denial of service vulnerability (CVE-2006-2940).
    
      - There is an inherited vulnerability in OpenSSL when
        performing Montgomery multiplication, leading to a
        side-channel attack vulnerability (CVE-2007-3108).
    
      - There is an inherited vulnerability in OpenSSH with the
        execution of the ~/.ssh2/rc session file
        (CVE-2008-1657).
    
      - There is an issue with the security of forwarded X11
        connections, leading to possible hijacking.
        (CVE-2008-1483)
    
      - There are multiple unspecified other vulnerabilities.
        (CVE-2008-6021)" );
     script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?79d29f9f" );
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Attachmate Reflection for Secure IT UNIX server 7.0 SP1." );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
     script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_cwe_id(264, 399);
     script_set_attribute(attribute:"plugin_publication_date", value: "2008/08/20");
     script_set_attribute(attribute:"vuln_publication_date", value: "2006/09/28");
     script_cvs_date("Date: 2018/11/15 20:50:23");
    script_set_attribute(attribute:"plugin_type", value:"remote");
    script_end_attributes();
    
     
      script_category(ACT_GATHER_INFO);
      script_family(english:"Misc.");
     
      script_copyright(english:"This script is Copyright (C) 2008-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
    
      script_dependencies("ssh_detect.nasl", "os_fingerprint.nasl");
      script_require_ports("Services/ssh", 22);
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("misc_func.inc");
    
    # Don't flag Windows hosts
    os = get_kb_item_or_exit("Host/OS");
    if (os && "Windows" >< os) audit(AUDIT_OS_NOT, "a Unix and Unix-like OS", "Microsoft Windows");
    
    port = get_kb_item("Services/ssh");
    if (!port) port = 22;
    if (!get_port_state(port)) audit(AUDIT_PORT_CLOSED, port);
    
    # Check the version in the banner.
    banner = get_kb_item("SSH/banner/" + port);
    if (!banner) audit(AUDIT_WEB_BANNER_NOT, port);
    if ("ReflectionForSecureIT_" >!< banner) audit(AUDIT_NOT_LISTEN, "Attachmate Reflection for Secure IT UNIX server", port);
    
    ver = strstr(banner, "ReflectionForSecureIT_") - "ReflectionForSecureIT_";
    if (!ver) audit(AUDIT_SERVICE_VER_FAIL, "Attachmate Reflection for Secure IT UNIX server SSH", port);
    
    arr = split(ver, sep:".", keep:FALSE);
    
    for ( i = 0 ; i < max_index(arr) ; i ++ )
    {
     arr[i] = int(arr[i]);
    }
    
    vuln = FALSE;
    
    if (arr[0] && arr[0] < 7) vuln = TRUE;
    if (arr[0] && arr[0] == 7 && arr[1] && arr[1] == 0)
    {
      if (arr[2] && arr[2] < 1) vuln = TRUE;
      if (arr[2] && arr[2] == 1 && arr[3] && arr[3] < 575) vuln = TRUE;
    }
    
    if (vuln)
    {
      if (report_verbosity)
      {
        report = string(
          "\n",
          "The remote Attachmate Reflection for Secure IT UNIX server returned\n",
          "the following banner :\n",
          "\n",
          "  ", banner, "\n"
        );
        security_hole(port:port, extra:report);
      }
      else security_hole(port);
    }
    else audit(AUDIT_LISTEN_NOT_VULN, "Attachmate Reflection for Secure IT UNIX server", port, ver);