Hi,

I have narrowed this problem to 3 plugins. To reproduce the fault
three plugins must be enable. The plugins are the Nessus TCP Scanner,
the BakBone NetVault Remote Heap Overflow Vulnerabilities (Plugin ID:
10605) and BIND vulnerable to overflows (Plugin ID: 18257). All other
plugins are disabled. The device under test is an embedded device. It
is not a BakBone NetVault.

My question is. Why do these particular plugins depend on each other
to reproduce the fault. Note that max_checks is set to 1. When anyone
of these plugins is disabled the device does not enter an error state.

Kind Regards
Kevin


On 10/9/07, Kevin Mc Grath <[EMAIL PROTECTED]> wrote:
> Hi,
>
> FYI, after specifying each port individually and then running the
> scans - the device was operational throughout and therefore could not
> reproduce the described bug with this configuration.
>
> -Kevin
>
> On 10/5/07, George A. Theall <[EMAIL PROTECTED]> wrote:
> > On 10/05/07 12:00, Kevin Mc Grath wrote:
> >
> > > When safe checks is enabled no crash occurs!
> >
> > Good to know.
> >
> > > How do I limit a Nessus scan to a single port?
> >
> > Change the port range from "default" to a single number from among those
> > you know to be open.
> >
> > George
> > --
> > [EMAIL PROTECTED]
> > _______________________________________________
> > Nessus mailing list
> > [email protected]
> > http://mail.nessus.org/mailman/listinfo/nessus
> >
>
_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to