Hello,

       I came to know below error is because  previous nasl script nvti  had 
line breaks in  either tag_summary or tag_insight.

Tags=cvss_base=0.0|cvss_base_vector=AV:N/AC:L/Au:N/C:N/I:N/A:N|detection=remote 
probe|last_modification=$Date: 2015-01-23 10:37:28 +0100 (Fri, 23 Jan 2015) 
$|creation_date=2014-11-11 10:04:39 +0100 (Tue, 11 Nov 2014)|summary=The script 
sends a connection\nrequest to the server and attempts to extract the version 
number\nfrom the reply.

This problem is with new 2105 plugins updated from nvt sync.

   Any idea, how to avoid this.  Thanks in advance for your help.


Thanks
Prasadh.

From: Prasadh Nanjundan
Sent: Thursday, September 03, 2015 12:18 PM
To: '[email protected]'
Subject: openvasmd rebuild issue

Hello,

       I am running recommend openvas version in Centos 5.7.   My sqlite 
version is sqlite-3.7.0.1-1.el5.art

[cid:[email protected]]

I am having trouble in rebuilding the openvasmd.  When I tried to rebuild in 
debug mode, below is the error.   When I check the nasl script file for the OID 
63730,  we don't have any message like below, I don't know where this message 
come from and why,    any help much appreciated.  Thanks in advance

md   main:  DEBUG:2015-09-03 06h02.57 utc :16961:    sql: INSERT into nvts 
(oid, version, name, summary, description, copyright, cve, bid, xref, tag, 
sign_key_ids, category, family, cvss_base, risk_factor) VALUES ('A security 
problem which may lead to unauthorized machine access
or code execution has been fixed by upgrading to rsync-2.5.7.
This problem only affects machines running rsync in daemon mode,
and is easier to exploit if the non-default option 'use chroot = no'
is used in the /etc/rsyncd.conf config file.

Any sites running an rsync server should upgrade immediately.

For complete information, see the rsync home page:

http://rsync.samba.org|summary=The remote host is missing an update as announced
via advisory SSA:2003-337-01.|qod_type=package|solution_type=VendorFix
1.3.6.1.4.1.25623.1.0.63730', '$Revision: 15 $', 'Debian Security Advisory DSA 
1758-1 (nss-ldapd)', 'Debian Security Advisory DSA 1758-1 (nss-ldapd)', '
Summary:
The remote host is missing an update to nss-ldapd
announced via advisory DSA 1758-1.
Vulnerability Insight:
Leigh James that discovered that nss-ldapd, an NSS module for using
LDAP as a naming service, by default creates the configuration file
/etc/nss-ldapd.conf world-readable which could leak the configured
LDAP password if one is used for connecting to the LDAP server.

The old stable distribution (etch) doesn''t contain nss-ldapd.

For the stable distribution (lenny) this problem has been fixed in
version 0.6.7.1.

For the unstable distribution (sid) this problem has been fixed in
version 0.6.8.

We recommend that you upgrade your nss-ldapd package.
Solution:
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201758-1', 
'Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com', 'CVE-2009-1073', 
'NOBID', 'NOXREF', 'check_type=authenticated package 
test|last_modification=$Date: 2013-10-27 13:49:54 +0100 (Sun, 27 Oct 2013) 
$|creation_date=2009-04-06 20:58:11 +0200 (Mon, 06 Apr 
2009)|cvss_base_vector=AV:L/AC:L/Au:N/C:C/I:N/A:N', '48479FF648DB4530', 3, 
'Debian Local Security Checks', '4.9', 'Medium');

md   main:WARNING:2015-09-03 06h02.57 utc :16961: sql: sqlite3_prepare failed: 
near "use": syntax error

md   main:CRITICAL:2015-09-03 06h02.57 utc :16961: handle_sigabrt: abort

md   main:  DEBUG:2015-09-03 06h02.57 utc :16961:    Cleaning up.

md   main:  DEBUG:2015-09-03 06h02.57 utc :16961:    Exiting.


Thanks

Prasadh

-----------------------------------------------------------------
Prasadh Nanjundan
Software Engineer
Tel : 080-42613061
UBIqube Solutions :  Agile Management Framework
www.ubiqube.com<http://www.ubiqube.com/> http://y2u.be/Nq3-ERkir5M

Confidentiality: This communication is intended for the above-named person and 
may be confidential and/or legally privileged. If it has come to you in error 
you must take no action based on it, nor must you copy or show it to anyone; 
please delete/destroy and inform the sender immediately


_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to