On Dec 7, 2006, at 3:17 PM, Nelson, C.M. wrote:

Plugin 11372 reports this about a Mac OS X ftp sever:

"Buffer overflow in FTP server in HPUX 11 and previous allows remote
attackers to execute arbitrary commands by creating a long pathname and calling the STAT command which uses glob to generate long strings. ***
Nessus reports this vulnerability using only *** information that was
gathered. Use caution *** when testing without safe checks enabled."

(Nessus identifies the target as Mac OS X 10.4.7, the ftp banner says
Mac OS X Server 10.5.5, however, the plugin refers to HPUX 11). Do HPUX and Mac OS X ftp servers have the same possible vulnerability or should
this plugin alert be ignored for Mac OS X?


I see what could cause a FP. I disabled the safe checks for the moment until we found a better way to do that.


Thanks,

Nicolas
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus
  • Plugin 11372 Nelson, C.M.
    • Re: Plugin 11372 Nicolas Pouvesle

Reply via email to