Here are my results on a 2.2.4 box.  

[EMAIL PROTECTED]:/usr/local/lib/nessus/plugins$ sudo /usr/local/sbin/nessusd -d

This is Nessus 2.2.4 for Linux 2.6.8-2-386
compiled with gcc version 3.3.5 (Debian 1:3.3.5-12)
Current setup :
        nasl                           : 2.2.4
        libnessus                      : 2.2.4
        SSL support                    : enabled
        SSL is used for client / server communication
        Running as euid                : 0

[EMAIL PROTECTED]:/usr/local/lib/nessus/plugins$ sudo nasl -t
xxx.xxx.xxx.xxx tcp_seq_window_debug.nasl
The remote host RSTed our packet...it's vulnerable
Success
[26897] plug_set_key:internal_send(0)['3 TCP/seq_window_flaw=1;
']: Socket operation on non-socket
[EMAIL PROTECTED]:/usr/local/lib/nessus/plugins$ 

---
The 2.2.5 box returned null results every time 
(NAT traversal interference a possibility?)

anondev:~# /usr/local/nessus/sbin/nessusd -d
This is Nessus 2.2.5 for Linux 2.6.8-2-386
compiled with gcc version 3.3.5 (Debian 1:3.3.5-12)
Current setup :
        nasl                           : 2.2.5
        libnessus                      : 2.2.5
        SSL support                    : enabled
        SSL is used for client / server communication
        Running as euid                : 0
anondev:~# nasl -t xxx.xxx.xxx.xxx
/usr/local/nessus/lib/nessus/plugins/tcp_seq_window_debug.nasl
anondev:~#

I ran both tests several times in a row and got consistant results on CLI.

However, automated nightly runs (and archived kb files) show the key
tcp_window_flaw missing in some scans.  Hence the original question. 
Could it be that

port = get_host_open_port()

is sometimes selecting a no-longer-open port for its test?

--

One other seperate question:  How do the report_paranoia settings map
up to numeric equivalents?  is normal 0? is paranoid 1? etc. 
Specifically I'm looking at this code:

if (debug) display("The remote host RSTed our packet...it's vulnerable\n");
if( report_paranoia > 0 ) security_warning(0);

Thank you everybody for your replies.

-anon
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to