Question..
Vulnerability Nessus ID 34820 shows that a server has the vulnerability: Symantec Backup Exec Authentication Bypass and Potential Buffer Overflow ID: 34820 <https://128.42.174.70/sc3/console.php?psid=8000&ctxid=8001%5enewscan%5eplug inid:34820> Family: Gain root remotely NASL: PLUGIN.nasl <https://128.42.174.70/sc3/console.php?view_nasl=PLUGIN.nasl> Synopsis : It is possible to bypass the backup agent authentication. Description : The remote host is running a version of VERITAS Backup Exec Agent which is vulnerable to multiple authentication bypass issues. An attacker may exploit this flaw to manage the backup agent and/or to execute commands with high privileges. Solution : http://www.symantec.com/avcenter/security/Content/2008.11.19.html Risk factor : Critical / CVSS Base Score : 10.0 (CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C) But, this fix was to install the latest and greatest version of BES, which it already has the newest version/the fix for this vulnerability. So, why does the vulnerability still show positive? I was not able to open the .nasl to see what the scan is doing: But, I was not able to open the "PLUGIN.nasl" Please advise. Thanks! Dee
_______________________________________________ Nessus mailing list [email protected] http://mail.nessus.org/mailman/listinfo/nessus
