Here is some more info on the changing config file problem.
Here is everything that is set to yes in the config file:
# cat .nessusbugbear | grep yes
10180 = yes
log_whole_attack = yes
report_killed_plugins = yes
optimize_test = yes
safe_checks = yes
reverse_lookup = yes
unscanned_closed = yes
11135 = yes
Ping the remote host[checkbox]:Do a TCP ping = yes
Nmap[checkbox]:Identify the remote OS = yes
Nmap[checkbox]:Do not randomize the order in which ports are scanned = yes
10180 is the ping_host plugin, 11135 is the bugbear plugin.
I run my cronjob on 4 subnets on campus. Here is everything set to yes after
the cronjob finishes:
# cat .nessusbugbear | grep yes
10180 = yes
log_whole_attack = yes
report_killed_plugins = yes
optimize_test = yes
safe_checks = yes
reverse_lookup = yes
unscanned_closed = yes
11135 = yes
1 = yes
10643 = yes
10992 = yes
10624 = yes
10842 = yes
10598 = yes
999 = yes
10587 = yes
11055 = yes
10834 = yes
10792 = yes
10813 = yes
Ping the remote host[checkbox]:Do a TCP ping = yes
Nmap[checkbox]:Identify the remote OS = yes
Nmap[checkbox]:Do not randomize the order in which ports are scanned = yes
I've gotten the number down from 90, but here are the other plugins enabled:
[fgrep output on the lines with "yes" above]
/usr/local/lib/nessus/plugins/ping_host.nasl: script_id(10180);
/usr/local/lib/nessus/plugins/bugbear.nasl: script_id(11135);
/usr/local/lib/nessus/plugins/40x_cross_site.nasl: script_id(10643);
/usr/local/lib/nessus/plugins/DDI_IIS_CodeBrws_Sample.nasl: script_id(10992);
/usr/local/lib/nessus/plugins/iis_shtml_cross_site.nasl: script_id(10624);
/usr/local/lib/nessus/plugins/mrtg_traversal.nasl: script_id(10842);
/usr/local/lib/nessus/plugins/mysql_overflow.nasl: script_id(10598);
/usr/local/lib/nessus/plugins/nessus_1_0_EOL.nasl: script_id(999);
/usr/local/lib/nessus/plugins/novell_gwweb.nasl: script_id(10587);
/usr/local/lib/nessus/plugins/openssl_overflow.nasl: script_id(11055);
/usr/local/lib/nessus/plugins/smb_nt_ms01-058.nasl: script_id(10834);
/usr/local/lib/nessus/plugins/textor_information_disclosure.nasl: script_id(10792);
/usr/local/lib/nessus/plugins/wu_ftpd_weirdcwd.nasl: script_id(10813);
Not only has the plugin list changed, the output of the scan says the following
for every host it contacted:
+ xxx.ua.edu :
. List of open ports :
o general/tcp (Security hole found)
. Vulnerability found on port general/tcp :
You are using Nessus 1.0, which is deprecated.
In March 2003, the Nessus team will definitely stop
updating plugins for this version, which means that
it will not be accurate at all and will die.
Note that the Nessus team plans to continue to add
new scripts until March 2003, but they will not be
tested on Nessus 1.0. Although they should work,
we do not garantee it.
Please upgrade to Nessus 1.2, available at http://www.nessus.org/
You are also encouraged to test the new experimental Nessus 1.3.0
if you want to use something fancy.
Output of `which nessus`: /usr/local/bin/nessus
Output of `which nessusd`: /usr/local/sbin/nessusd
# nessus --version
nessus (Nessus) 1.2.7 for Linux
(C) 1998 - 2002 Renaud Deraison <[EMAIL PROTECTED]>
SSL used for client - server communication
# nessusd -v
nessusd (Nessus) 1.2.7 for Linux
(C) 1998 - 2002 Renaud Deraison <[EMAIL PROTECTED]>
The script specifically invokes /usr/local/bin/nessus
and the log file shows version 1.2.7 of the daemon running.
I'm at a complete loss here. I think its time for a reboot.
Darren Evans-Young,
The University of Alabama
Tuscaloosa, AL
P.S. - FWIW, reboot made no difference.