try adding:

strace -f -e connect <your nasl command>.


and check output? is the host really vulnerable?


--

Eero

2015-09-15 2:28 GMT+03:00 Howard Sheen <[email protected]>:

> Thanks Michael for the response.
>
> I did as suggested but the command still gives me the same output.
> set key HostDetails -> EXIT_CODE
> set key HostDetails/NVT/(null)/EXIT_CODE -> EXIT_NOTVULN
>
> Is there anything I can try in addition the fix you suggested?
>
> Thanks
> Howard
>
>
> On Sat, Sep 12, 2015 at 12:48 AM Michael Meyer <
> [email protected]> wrote:
>
>> *** Howard Sheen wrote:
>>
>> > I tried to run gb_openssl_ccs_67899.nasl individually to check
>> > "CVE-2014-0224" but my command does not seem to work.
>>
>> Replace
>>
>> port = get_kb_item("Transport/SSL");
>>
>> with
>>
>> port = 443;
>>
>> if you want to run the NVT against port 443.
>>
>> --
>> Michael Meyer                  OpenPGP Key: 0xAF069E9152A6EFA6
>> http://www.greenbone.net/
>> Greenbone Networks GmbH, Neuer Graben 17, 49074 Osnabrück | AG
>> Osnabrück, HR B 202460
>> Geschäftsführer: Lukas Grunwald, Dr. Jan-Oliver Wagner
>> _______________________________________________
>> Openvas-discuss mailing list
>> [email protected]
>> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>>
>
> _______________________________________________
> Openvas-discuss mailing list
> [email protected]
> https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
>
_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to