Vulnerability Name: CVE-2006-0705 (CCN-24651) Assigned: 2006-02-13 Published: 2006-02-13 Updated: 2017-07-20 Summary: Format string vulnerability in a logging function as used by various SFTP servers, including (1) AttachmateWRQ Reflection for Secure IT UNIX Server before 6.0.0.9, (2) Reflection for Secure IT Windows Server before 6.0 build 38, (3) F-Secure SSH Server for Windows before 5.3 build 35, (4) F-Secure SSH Server for UNIX 3.0 through 5.0.8, (5) SSH Tectia Server 4.3.6 and earlier and 4.4.0, and (6) SSH Shell Server 3.2.9 and earlier, allows remote authenticated users to execute arbitrary commands via unspecified vectors, involving crafted filenames and the stat command. CVSS v3 Severity: 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P )4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
5.1 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P )3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-134 Vulnerability Consequences: Gain Access References: Source: MITRE Type: CNACVE-2006-0705 Source: HP Type: UNKNOWNHPSBTU02322 Source: CCN Type: SA18828SSH Tectia Server SFTP Service Unspecified Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory18828 Source: CCN Type: SA18843WRQ Reflection Secure IT SFTP Format String Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory18843 Source: CCN Type: SA24516Gentoo net-misc/ssh Vulnerability Source: SECUNIA Type: Vendor Advisory24516 Source: CCN Type: SA29552HP Tru64 UNIX SSH SFTP Server Vulnerability Source: SECUNIA Type: Vendor Advisory29552 Source: GENTOO Type: UNKNOWNGLSA-200703-13 Source: CCN Type: SECTRACK ID: 1015619SSH Tectia Server SFTP Logging Bug May Let Remote Authenticated Users Execute Arbitrary Commands Source: SECTRACK Type: Patch1015619 Source: CCN Type: WRQ Tech Note 1882Reflection for Secure IT Server Security Vulnerability Update and Workaround Source: CONFIRM Type: Patchhttp://support.wrq.com/techdocs/1882.html Source: CCN Type: GLSA-200703-13SSH Communications Security's Secure Shell Server: SFTP privilege escalation Source: CCN Type: US-CERT VU#419241Multiple vendor SFTP logging format string vulnerability Source: CERT-VN Type: Patch, US Government ResourceVU#419241 Source: CCN Type: OSVDB ID: 23120SSH Tectia Server SFTP Service Filename Logging Format String Source: CCN Type: OSVDB ID: 23172WRQ Reflection Secure IT SFTP Service Filename Logging Format String Source: CCN Type: BID-14733AttachmateWRQ Reflection for Secure IT Windows Server Renamed Account Remote Login Vulnerability Source: CCN Type: BID-14734AttachmateWRQ Reflection for Secure IT Windows Server Insecure Private Key Permissions Vulnerability Source: CCN Type: BID-14735AttachmateWRQ Reflection for Secure IT Windows Server Access Restriction Bypass Vulnerability Source: BID Type: Patch16625 Source: CCN Type: BID-16625AttachmateWRQ Reflection for Secure IT Remote Format String Vulnerability Source: BID Type: UNKNOWN16640 Source: CCN Type: BID-16640SSH Tectia Server Remote Format String Vulnerability Source: CCN Type: SSH Communications Security Web siteSSH Tectia Server Downloads Source: VUPEN Type: Vendor AdvisoryADV-2006-0554 Source: VUPEN Type: Vendor AdvisoryADV-2006-0555 Source: VUPEN Type: Vendor AdvisoryADV-2008-1008 Source: CCN Type: HP IT resource center Web siteHP Tru64 UNIX - SSRT080011: SSH Running on HP Tru64 UNIX, Remote Execution of Arbitrary Code or Denial of Service (DoS) Source: CCN Type: AttachmateWRQ Web siteUsing the AttachmateWRQ Upgrade Process Source: XF Type: UNKNOWNsftp-logging-format-string(24651) Source: XF Type: UNKNOWNsftp-logging-format-string(24651) Vulnerable Configuration: Configuration 1 :cpe:/a:attachmatewrq:reflection_for_secure_it_server:6.0:*:unix:*:*:*:*:* OR cpe:/a:attachmatewrq:reflection_for_secure_it_server:6.0:*:win:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.0:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.1:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.1:*:unix:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.2:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.3:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.4:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.5:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.6:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.7:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.8:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.0.9:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.1.0:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.1.0:*:unix:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.1.0_build9:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.2.0:*:unix:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:3.2.3:*:unix:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:5.0:*:*:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:5.1:*:win:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:5.2:*:win:*:*:*:*:* OR cpe:/a:f-secure:f-secure_ssh_server:5.3:*:win:*:*:*:*:* Configuration CCN 1 :cpe:/a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.0:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:* OR cpe:/a:ssh:tectia_server:4.4:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
attachmatewrq reflection for secure it server 6.0
attachmatewrq reflection for secure it server 6.0
f-secure f-secure ssh server 3.0.0
f-secure f-secure ssh server 3.0.1
f-secure f-secure ssh server 3.0.1
f-secure f-secure ssh server 3.0.2
f-secure f-secure ssh server 3.0.3
f-secure f-secure ssh server 3.0.4
f-secure f-secure ssh server 3.0.5
f-secure f-secure ssh server 3.0.6
f-secure f-secure ssh server 3.0.7
f-secure f-secure ssh server 3.0.8
f-secure f-secure ssh server 3.0.9
f-secure f-secure ssh server 3.1.0
f-secure f-secure ssh server 3.1.0
f-secure f-secure ssh server 3.1.0_build9
f-secure f-secure ssh server 3.2.0
f-secure f-secure ssh server 3.2.3
f-secure f-secure ssh server 5.0
f-secure f-secure ssh server 5.1
f-secure f-secure ssh server 5.2
f-secure f-secure ssh server 5.3
ssh tectia server 4.0.3
ssh tectia server 4.0.4
ssh tectia server 4.3.6
ssh tectia server 4.0
ssh tectia server 4.0.5
ssh tectia server 4.2.1
ssh tectia server 4.3
ssh tectia server 4.3.1
ssh tectia server 4.3.2
ssh tectia server 4.3.3
ssh tectia server 4.3.4
ssh tectia server 4.3.5
ssh tectia server 4.4
gentoo linux *