Helmut,

i have an open support-ticket on that issue. There was a fix on that NVT
some weeks before, but now it seems to me that this is only related to SMB
on Linux. It seems to be fixed on Windows-machines. It shouldn't be a
vulnerability at all.

Stefan
 

-----Ursprüngliche Nachricht-----
Von: Openvas-discuss [mailto:[email protected]] Im
Auftrag von Helmut Koers
Gesendet: Donnerstag, 1. September 2016 08:58
An: [email protected]
Betreff: [Openvas-discuss] SMB Brute Force Logins With Default Credentials

A recent scan shows a lot of "SMB Brute Force Logins With Default
Credentials" on a single host. The details is always "It was possible to
login with the following credentials via the SMB protocol.
<User>:<Password>" with different user/password combinations. 

The related host seems to have a guest sessions with any credentials allowed
. 

Is it supposed to result in multiple vulnerabilities, or shouldn't this just
result in one vulnerability? 

Thanks, 
Helmut

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
Openvas-discuss mailing list
[email protected]
https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss

Reply via email to