The plugin for the
ASN.1 parsing vulnerability (828028)
checks the registry remotely if the patch was installed - this depends on remote_full_access to the registry.
A
ny chances for one or more plugins that are working remotely by trying to exploit the vuln?
Someone had a deeper look or tcpdump at the corresponding retina-plugin?


--

Thomas Springer
TUEV ICS - IT-Security
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to