Helmut, i have an open support-ticket on that issue. There was a fix on that NVT some weeks before, but now it seems to me that this is only related to SMB on Linux. It seems to be fixed on Windows-machines. It shouldn't be a vulnerability at all.
Stefan -----Ursprüngliche Nachricht----- Von: Openvas-discuss [mailto:[email protected]] Im Auftrag von Helmut Koers Gesendet: Donnerstag, 1. September 2016 08:58 An: [email protected] Betreff: [Openvas-discuss] SMB Brute Force Logins With Default Credentials A recent scan shows a lot of "SMB Brute Force Logins With Default Credentials" on a single host. The details is always "It was possible to login with the following credentials via the SMB protocol. <User>:<Password>" with different user/password combinations. The related host seems to have a guest sessions with any credentials allowed . Is it supposed to result in multiple vulnerabilities, or shouldn't this just result in one vulnerability? Thanks, Helmut
smime.p7s
Description: S/MIME cryptographic signature
_______________________________________________ Openvas-discuss mailing list [email protected] https://lists.wald.intevation.org/cgi-bin/mailman/listinfo/openvas-discuss
