On Tue, Sep 14, 2010 at 4:10 AM, Jan-Oliver Wagner <jan-oliver.wag...@greenbone.net> wrote: > On Montag, 13. September 2010, Kaushal Shriyan wrote: >> I get the below error in /var/log/openvas/openvassd.dump, I am on >> debian 5.0.6 OS. Please suggest >> >> [12700](/var/lib/openvas/plugins/remote-pwcrack-options.nasl) >> script_get_preference_file_location: could not get local file name >> from preference Passwords file : >> [12706](/var/lib/openvas/plugins/ssh_authorization.nasl) >> gnutls_x509_privkey_import_pkcs8: Decryption has failed. (-24) > > Just a quick guess: > > Debian carries 2 versions (internal IDs: 13 and 26) of gnutls. > Maybe you applied the old version?
Hi Jan-Oliver Wagner I am no more able to reproduce that error now. Also I have a concern I still get "It was not possible to login using the SSH crendentials supplied. Hence local security checks are not enabled." As kost suggested below on the openvas-discuss mailing list "I guess you're using remote checks which often can be unaccurate (especially if they rely on version check only) as linux distributions doesn't update the version if they fix only vulnerabilities. If you want more accurate results, I would suggest using local security checks. That means you need to provide credentials of target machines to OpenVAS. " I am using openvas scanner which is a component in OSSIM (http://www.alienvault.com/community.php?section=Home) The OSSIM software is build on top of debian OS 5.0.6. I have the latest update and the openvas signatures are updated frequently on a daily basis invoked by cron. Also the target machine is Ubuntu 10.04.1 server and there are no USN (http://www.ubuntu.com/usn/usn-908-1) for Apache in Ubuntu 10.04 server , even which the scanner reports vulnerabilities in Apache2 which are detailed below. Overview: Apache is prone to multiple vulnerabilities. These issues may lead to information disclosure or other attacks. Apache versions prior to 2.2.15-dev are affected. Solution: These issues have been addressed in Apache 2.2.15-dev. Apache 2.2.15 including fixes will become available in the future as well. Please see the references for more information. References: http://www.securityfocus.com/bid/38494 http://httpd.apache.org/security/vulnerabilities_22.html http://httpd.apache.org/ https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 http://svn.apache.org/viewvc?view=revision&revision=917870 Risk factor : Medium CVE : CVE-2010-0425, CVE-2010-0434, CVE-2010-0408 BID : 38494, 38491 OID : 1.3.6.1.4.1.25623.1.0.100514 Overview: Apache HTTP Server is prone to multiple remote denial-of-service vulnerabilities. An attacker can exploit these issues to deny service to legitimate users. Versions prior to Apache 2.2.16 are vulnerable. Solution: These issues have been fixed in Apache 2.2.16. Please see the references for more information. References: https://www.securityfocus.com/bid/41963 http://httpd.apache.org/download.cgi http://httpd.apache.org/ http://www.apache.org/dist/httpd/Announcement2.2.html http://www.apache.org/dist/httpd/CHANGES_2.2.16 CVE : CVE-2010-1452 BID : 41963 OID : 1.3.6.1.4.1.25623.1.0.100725 Overview: This host is running Apache HTTP Server and is prone to Denial of Service vulnerability. Vulnerability Insight: The flaw is due to error in 'stream_reqbody_cl' function in 'mod_proxy_http.c' in the mod_proxy module. When a reverse proxy is configured, it does not properly handle an amount of streamed data that exceeds the Content-Length value via crafted requests. Impact: Successful exploitation will allow remote attackers to cause Denial of Service to the legitimate user by CPU consumption. Impact Level: Application Affected Software/OS: Apache HTTP Server version prior to 2.3.3 Fix: Fixed in the SVN repository. http://svn.apache.org/viewvc?view=rev&revision=790587 References: http://secunia.com/advisories/35691 http://www.vupen.com/english/advisories/2009/1773 http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=790587&r2=790586&pathrev=790587 CVSS Score: CVSS Base Score : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P) CVSS Temporal Score : 3.7 Risk factor : Medium CVE : CVE-2009-1890 BID : 35565 OID : 1.3.6.1.4.1.25623.1.0.800827 Please suggest/guide in this context. Thanks and Regards Kaushal _______________________________________________ Openvas-devel mailing list Openvas-devel@wald.intevation.org http://lists.wald.intevation.org/mailman/listinfo/openvas-devel