Hi, I have narrowed this problem to 3 plugins. To reproduce the fault three plugins must be enable. The plugins are the Nessus TCP Scanner, the BakBone NetVault Remote Heap Overflow Vulnerabilities (Plugin ID: 10605) and BIND vulnerable to overflows (Plugin ID: 18257). All other plugins are disabled. The device under test is an embedded device. It is not a BakBone NetVault.
My question is. Why do these particular plugins depend on each other to reproduce the fault. Note that max_checks is set to 1. When anyone of these plugins is disabled the device does not enter an error state. Kind Regards Kevin On 10/9/07, Kevin Mc Grath <[EMAIL PROTECTED]> wrote: > Hi, > > FYI, after specifying each port individually and then running the > scans - the device was operational throughout and therefore could not > reproduce the described bug with this configuration. > > -Kevin > > On 10/5/07, George A. Theall <[EMAIL PROTECTED]> wrote: > > On 10/05/07 12:00, Kevin Mc Grath wrote: > > > > > When safe checks is enabled no crash occurs! > > > > Good to know. > > > > > How do I limit a Nessus scan to a single port? > > > > Change the port range from "default" to a single number from among those > > you know to be open. > > > > George > > -- > > [EMAIL PROTECTED] > > _______________________________________________ > > Nessus mailing list > > [email protected] > > http://mail.nessus.org/mailman/listinfo/nessus > > > _______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
