ASN.1 parsing vulnerability (828028)
checks the registry remotely if the patch was installed - this depends on remote_full_access to the registry.
A
ny chances for one or more plugins that are working remotely by trying to exploit the vuln?
Someone had a deeper look or tcpdump at the corresponding retina-plugin?
--
Thomas Springer TUEV ICS - IT-Security _______________________________________________ Nessus mailing list [EMAIL PROTECTED] http://mail.nessus.org/mailman/listinfo/nessus
