All,

I apologize that it has taken me so long to post a follow-up on this problem.

Thank you to everyone on the list who provided input and especially to George 
Theall for his support of this group!  He was instrumental in helping me get 
this one resolved.

We had  new server built and the primary application was Veritas NetBackup NOM. 
 There were several pcsync-https vulnerabilities found and what appeared to be 
numerous false-positives for cross-site scripting vulnerabilities (hope I said 
that correctly).

In the end my co-worker responsible for the server worked with Veritas (now 
Symantec).  Their suggestion was to just change the port that the server was 
running on.  ...nice try!  The issue was escalated at Veritas and that engineer 
came back with the same answer.  We tried it and the number of vulnerabilities 
decreased slightly.  But, it was only the "minors" that were no longer showing 
up on the scans.

The final resolution did not come from Veritas.  We were pretty sure that a 
newer version of Apache needed to be used; but we were told that it was not 
available from Veritas.  They were not updating it and they didn't see why a 
"cross site scripting vulnerability" in Apache was a problem for the 
functionality of Veritas NetBackup.  We could do it on our own but it would 
void any support from Veritas for their product.  Nice Catch-22!!  

About two weeks ago my co-worker was looking on the Veritas website for 
something else and saw that the build number on NOM had been incremented 
although the version number had not.  He downloaded it, uninstalled the old 
version and installed the new version.  BINGO!  All of the vulnerabilities went 
away.  Checked the version of Apache installed with the newer build of the NOM 
and it had been updated.

Thanks,
eric





      
____________________________________________________________________________________
Fussy? Opinionated? Impossible to please? Perfect.  Join Yahoo!'s user panel 
and lay it on us. http://surveylink.yahoo.com/gmrs/yahoo_panel_invite.asp?a=7 
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to