On Tue, Sep 14, 2010 at 11:55 PM, Kaushal Shriyan
<kaushalshri...@gmail.com> wrote:
> On Tue, Sep 14, 2010 at 8:07 AM, Kaushal Shriyan
> <kaushalshri...@gmail.com> wrote:
>> On Tue, Sep 14, 2010 at 4:10 AM, Jan-Oliver Wagner
>> <jan-oliver.wag...@greenbone.net> wrote:
>>> On Montag, 13. September 2010, Kaushal Shriyan wrote:
>>>> I get the below error in /var/log/openvas/openvassd.dump, I am on
>>>> debian 5.0.6 OS. Please suggest
>>>>
>>>> [12700](/var/lib/openvas/plugins/remote-pwcrack-options.nasl)
>>>> script_get_preference_file_location: could not get local file name
>>>> from preference Passwords file :
>>>> [12706](/var/lib/openvas/plugins/ssh_authorization.nasl)
>>>> gnutls_x509_privkey_import_pkcs8: Decryption has failed. (-24)
>>>
>>> Just a quick guess:
>>>
>>> Debian carries 2 versions (internal IDs: 13 and 26) of gnutls.
>>> Maybe you applied the old version?
>>
>> Hi Jan-Oliver Wagner
>>
>> I am no more able to reproduce that error now. Also I have a concern I
>> still get "It was not possible to login using the SSH crendentials
>> supplied.
>> Hence local security checks are not enabled."
>>
>> As kost suggested below on the openvas-discuss mailing list
>>
>> "I guess you're using remote checks which often can be unaccurate
>> (especially if they rely on version check only) as linux distributions
>> doesn't update the version if they fix only vulnerabilities. If you
>> want more accurate results, I would suggest using local security
>> checks. That
>> means you need to provide credentials of target machines to OpenVAS. "
>>
>> I am using openvas scanner which is a component in OSSIM
>> (http://www.alienvault.com/community.php?section=Home)
>> The OSSIM software is build on top of debian OS 5.0.6. I have the
>> latest update and the openvas signatures are updated frequently on a
>> daily basis invoked by cron.
>>
>> Also the target machine is Ubuntu 10.04.1 server and there are no USN
>> (http://www.ubuntu.com/usn/usn-908-1) for Apache in Ubuntu 10.04
>> server , even which the scanner reports vulnerabilities in Apache2
>> which are detailed below.
>>
>> Overview:
>> Apache is prone to multiple vulnerabilities.
>>
>> These issues may lead to information disclosure or other attacks.
>>
>> Apache versions prior to 2.2.15-dev are affected.
>>
>> Solution:
>> These issues have been addressed in Apache 2.2.15-dev. Apache 2.2.15
>> including fixes will become available in the future as well. Please
>> see the references for more information.
>>
>> References:
>> http://www.securityfocus.com/bid/38494
>> http://httpd.apache.org/security/vulnerabilities_22.html
>> http://httpd.apache.org/
>> https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
>> http://svn.apache.org/viewvc?view=revision&revision=917870
>>
>> Risk factor : Medium
>> CVE : CVE-2010-0425, CVE-2010-0434, CVE-2010-0408
>> BID : 38494, 38491
>> OID : 1.3.6.1.4.1.25623.1.0.100514
>>
>> Overview:
>> Apache HTTP Server is prone to multiple remote denial-of-service
>> vulnerabilities.
>>
>> An attacker can exploit these issues to deny service to
>> legitimate users.
>>
>> Versions prior to Apache 2.2.16 are vulnerable.
>>
>> Solution:
>> These issues have been fixed in Apache 2.2.16. Please see the
>> references for more information.
>>
>> References:
>> https://www.securityfocus.com/bid/41963
>> http://httpd.apache.org/download.cgi
>> http://httpd.apache.org/
>> http://www.apache.org/dist/httpd/Announcement2.2.html
>> http://www.apache.org/dist/httpd/CHANGES_2.2.16
>> CVE : CVE-2010-1452
>> BID : 41963
>> OID : 1.3.6.1.4.1.25623.1.0.100725
>>
>> Overview:
>> This host is running Apache HTTP Server and is prone to Denial of Service
>> vulnerability.
>>
>> Vulnerability Insight:
>> The flaw is due to error in 'stream_reqbody_cl' function in 
>> 'mod_proxy_http.c'
>> in the mod_proxy module. When a reverse proxy is configured, it does
>> not properly
>> handle an amount of streamed data that exceeds the Content-Length value via
>> crafted requests.
>>
>> Impact:
>> Successful exploitation will allow remote attackers to cause Denial of 
>> Service
>> to the legitimate user by CPU consumption.
>>
>> Impact Level: Application
>>
>> Affected Software/OS:
>> Apache HTTP Server version prior to 2.3.3
>>
>> Fix:
>> Fixed in the SVN repository.
>> http://svn.apache.org/viewvc?view=rev&revision=790587
>>
>> References:
>> http://secunia.com/advisories/35691
>> http://www.vupen.com/english/advisories/2009/1773
>> http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=790587&r2=790586&pathrev=790587
>>
>> CVSS Score:
>> CVSS Base Score : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
>> CVSS Temporal Score : 3.7
>> Risk factor : Medium
>> CVE : CVE-2009-1890
>> BID : 35565
>> OID : 1.3.6.1.4.1.25623.1.0.800827
>>
>> Please suggest/guide in this context.
>>
>> Thanks and Regards
>>
>> Kaushal
>>
>
> Hi Again,
>
> Any Updates about my earlier post to this Mailing List.
>
> Thanks and Regards
>
> Kaushal
>

Hi Again,

Any Updates about my earlier post to this Mailing List.

Thanks and Regards

Kaushal
_______________________________________________
Openvas-devel mailing list
Openvas-devel@wald.intevation.org
http://lists.wald.intevation.org/mailman/listinfo/openvas-devel

Reply via email to