Hello!

I guess you're using remote checks which often can be unaccurate
(especially if they rely on version check only) as linux distributions
doesn't update the version if they fix only vulnerabilities. If you want
more accurate results, I would suggest using local security checks. That
means you need to provide credentials of target machines to OpenVAS.

Hope it helps,

On 09/13/2010 08:08 AM, Bhat, Avinash (NSN - IN/Bangalore) wrote:
> Hey all,
> 
> I just want to shed a light on my current status.
> 
> I had started writing a "White Paper" on openVAS. I would like to receive as 
> much as inputs from your side. Please co-opereate with me for the better 
> outcome which will be very helpful from all of you.
> 
> Waiting for the earliest response.
> 
> Best Regards, 
> Avinash V.Bhat| Nokia Siemens Networks | SPA2 |( +91 (80) 4363 2091(Direct) | 
> ( (858) 2091(VOIP) | y : [email protected] 
> 
> 
> -----Original Message-----
> From: [email protected] 
> [mailto:[email protected]] On Behalf Of ext Kaushal 
> Shriyan
> Sent: Monday, September 13, 2010 11:26 AM
> To: [email protected]
> Subject: [Openvas-discuss] openvas scanner
> 
> Hi
> 
> I have ran openvas scanner on one of the client host. The report
> suggests Apache versions prior to 2.2.15-dev are affected. I had a
> word with Ubuntu Security Team, "Your OpenVAS scan is a false alert,
> as it's relying on the version number" Please suggest/guide.
> 
> Thanks and Regards
> 
> Kaushal
> 
> Overview:
> Apache is prone to multiple vulnerabilities.
> 
> These issues may lead to information disclosure or other attacks.
> 
> Apache versions prior to 2.2.15-dev are affected.
> 
> Solution:
> These issues have been addressed in Apache 2.2.15-dev. Apache 2.2.15
> including fixes will become available in the future as well. Please
> see the references for more information.
> 
> References:
> http://www.securityfocus.com/bid/38494
> http://httpd.apache.org/security/vulnerabilities_22.html
> http://httpd.apache.org/
> https://issues.apache.org/bugzilla/show_bug.cgi?id=48359
> http://svn.apache.org/viewvc?view=revision&revision=917870
> 
> Risk factor : Medium
> CVE : CVE-2010-0425, CVE-2010-0434, CVE-2010-0408
> BID : 38494, 38491
> OID : 1.3.6.1.4.1.25623.1.0.100514
> 
>       Overview:
> Apache HTTP Server is prone to multiple remote denial-of-service
> vulnerabilities.
> 
> An attacker can exploit these issues to deny service to
> legitimate users.
> 
> Versions prior to Apache 2.2.16 are vulnerable.
> 
> Solution:
> These issues have been fixed in Apache 2.2.16. Please see the
> references for more information.
> 
> References:
> https://www.securityfocus.com/bid/41963
> http://httpd.apache.org/download.cgi
> http://httpd.apache.org/
> http://www.apache.org/dist/httpd/Announcement2.2.html
> http://www.apache.org/dist/httpd/CHANGES_2.2.16
> CVE : CVE-2010-1452
> BID : 41963
> OID : 1.3.6.1.4.1.25623.1.0.100725
> 
>       
> 
> Overview:
> This host is running Apache HTTP Server and is prone to Denial of Service
> vulnerability.
> 
> Vulnerability Insight:
> The flaw is due to error in 'stream_reqbody_cl' function in 'mod_proxy_http.c'
> in the mod_proxy module. When a reverse proxy is configured, it does
> not properly
> handle an amount of streamed data that exceeds the Content-Length value via
> crafted requests.
> 
> Impact:
> Successful exploitation will allow remote attackers to cause Denial of Service
> to the legitimate user by CPU consumption.
> 
> Impact Level: Application
> 
> Affected Software/OS:
> Apache HTTP Server version prior to 2.3.3
> 
> Fix:
> Fixed in the SVN repository.
> http://svn.apache.org/viewvc?view=rev&revision=790587
> 
> References:
> http://secunia.com/advisories/35691
> http://www.vupen.com/english/advisories/2009/1773
> http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?r1=790587&r2=790586&pathrev=790587
> 
> CVSS Score:
> CVSS Base Score : 5.0 (AV:N/AC:L/Au:NR/C:N/I:N/A:P)
> CVSS Temporal Score : 3.7
> Risk factor : Medium
> CVE : CVE-2009-1890
> BID : 35565
> OID : 1.3.6.1.4.1.25623.1.0.800827
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss
_______________________________________________
Openvas-discuss mailing list
[email protected]
http://lists.wald.intevation.org/mailman/listinfo/openvas-discuss

Reply via email to